Watermarking Schemes For Copy Protection: A Survey
Watermarking Schemes For Copy Protection: A Survey
Watermarking Schemes For Copy Protection: A Survey
1, February 2012
ABSTRACT
DIGITAL WATERMARKING IS THE PROCESS OF EMBEDDING INFORMATION INTO A DIGITAL SIGNAL, I.E. AUDIO, PICTURES, VIDEO, ETC. EMBEDDED MARKS IN THE MESSAGE ARE GENERALLY IMPERCEPTIBLE BUT CAN BE DETECTED OR EXTRACTED. THE EMBEDDING TAKES PLACE BY MANIPULATING THE CONTENT OF THE DIGITAL DATA, WHICH MEANS THE INFORMATION IS NOT EMBEDDED IN THE FRAME AROUND THE DATA. IF THE SIGNAL IS COPIED, THEN THE EMBEDDED INFORMATION IS ALSO IN THE COPY. BY IMPERCEPTIBLY HIDING INFORMATION INTO THE VIDEO CONTENT IT WILL BE POSSIBLE TO PREVENT COPYING OR PLAYBACK OF SUCH CONTENT. SO, WATERMARKING IS AN EMERGING TECHNOLOGY THAT IS CLAIMED TO HAVE AN IMPORTANT APPLICATION IN COPY PROTECTION. A VARIETY OF WATERMARKING TECHNIQUES HAVE BEEN PROPOSED BY RESEARCHERS FOR THE COPY-PROTECTION. THIS PAPER PRESENTS AN EXTENSIVE REVIEW OF THE PREVAILING LITERATURE IN WATERMARKING FOR COPY PROTECTION.
KEYWORDS
Broadcast monitoring, Copy protection, Digital image watermarking, Video
1. INTRODUCTION
As the digital broadcasting is developing enormous digital multimedia contents are available easily. Digital media have an advantage that can be copied without loss in quality but it is also a disadvantage in the viewpoint of copyright management. There are several researches of copy protection in DVD (Digital Versatile Disk) recorder [1-3]. Digital watermarking is a technique that proffers a means to guard digital images from illegal copying and manipulation. The procedure of embedding data into a multimedia element like image, audio or video is referred to as watermarking [4]. It is possible to extract this embedded data at a later stage, or detected in the multimedia element for diverse purposes including copy protection, access control, and broadcast monitoring . An image watermarking procedure needs to satisfy the following requirements [5]. Transparency: The embedded watermark pattern does not visually destroy the original image fidelity and needs to be perceptually invisible. Robustness: The watermark pattern is hard to detect and remove in an illegal way. In order for a watermark to be beneficial it needs to be flexible to a range of possible attacks by pirates. These attacks may be robustness against compression such as JPEG, scaling and aspect ratio changes, rotation, cropping, row and column removal, addition of noise, filtering, cryptographic and statistical attacks, as well as insertion of other watermarks [6].
DOI : 10.5121/ijcses.2012.3106
65
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012
1.1 Transparency
The PSNR is used for evaluating the transparency of watermarking technique for copy protection . Moreover, the peak signal-to-noise ratio (PSNR) was used to evaluate the quality of the watermarked image. The PSNR is defined as :
where are the gray levels of pixels in the host and watermarked images, respectively. The image quality is increased with increasing PSNR.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012
3. Set decision thresholds so that the probability of false detections is less than 106. 4. For each test image, run robustness tests for the following operations: Table 1 Robustness test S.No. 1. 2. 3. 4. 5. 6. 7. 8. Operation JPEG compression Blurring Noise adding Gamma correction Permutation of pixels Mosaic filter Median filtering Histogram equalization Parameter Quality factor Number of operations / kernel size Noise Amplitude (SNR) Gamma exponent Kernel size Kernel size Kernel size N /A
2. PROBLEM STATEMENT
New platform that embeds hard disk drive in the DBR(Digital Broadcast Receiver) system is developed recently [7]. This system can cause a copyright infringement problem if there is no copy protection scheme. Once a scrambled program is descrambled, this stream can be copied several times after saving in the hard disk drive. So there is a need to add copy protection information to the stream. This information must be strongly embedded to the contents. It can only be removed when the contents suffers evere degradation. This is a reason why watermarking method should be used. For copy protection, watermark information must be embedded in the content and detected whether this content is copyrighted or not. Watermarked video data has two kinds of copy control information i.e., Copy never, or Copy freely. When the use users try to copy a stream to another media, after checking this copy control information, the copy process is done when the bit is Copy freely. In the case of Copy never, the content cannot be copied anymore.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012
Detection of copy-protection state should be fast. The average consumer should not be able to circumvent the copy protection system. The false-positive rate should be extremely low. The copy protection system should be inexpensive to implement.
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012
sequence is segmented as scenes using the macroblock types of B-picture in the MPEG compressed domain. Second, for each scene, different embedding parameter is determined from the image complexity and motion vector amplitude. For copy protection, copy control watermark information is embedded in the DCT Domain content whether the content is copyrighted or not. G. Boatoet et al [13] shows a major limitation of some recently proposed asymmetric watermarking techniques based on linear algebra lies in the strong dependence of the watermark on the original image. Table 1 Comparative Analysis S. No. 1. Author I.J.Cox [8] Applicatio n Area DVD Remarks 1.Improve the protection provided by encryption protocol. 2.Reduce the value of illegal unencrypted copies when they are made by making them unplayable on compliant devices. 3.This paper gives the main requirement for a watermarking solution for DVD copy protection 1.Differentiate of still Image and Video watermarking 2. In video,due to the sheer volume of data & interlacing structure, the Quality of the content will reduce & the attack will not remove by consumer. 1. DVD copy protection problem can not be solved By encryption alone. Authentication & session Key generation mechanism is needed for all interfaces. 2 .Correlation method for embedding & detection. 3. Watermark detector should be included in the playback drive. 4. System prevents the Local scrambling or bit inversion attack 1. Implemented a Scene change detection algorithm In compressed domain for low computing power system. 1. Video is segmented into different scenes. 2. Encoded by using DCT. 3. Uses scene-change detection algorithm. Year 1999
2.
1999
3.
DVD
2000
4.
5.
6.
Y. K. Seong, Y. H. Choi, J. A. Park, & T. S. Choi[11] Yeong Kyeong Seong, Yoon-Hee Choi, [12] . Fontanari, F. G. B.
Broadcasti ng
2002
2004
Video
1. Scheme is based on Linear Algebra, which is proven to be secure under protection attacks.
2006
69
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012
7.
Video or Broadcasti ng
1. Application is emerged as Free-view TV. 2 .Image based rendering operation is performed. 3. Frame of multiple views are used. 4. Camera position & homography estimation methods are proposed.
2010
5. CONCLUSIONS
Even though copy protection has received ample attention in the standardization of digital video in the past five years, several issues have not yet been fully resolved. It may be unlikely that a bullet-proof solution will ever be found, but the discussions are converging on what technical mechanisms should be involved and against what these can protect. Watermarking for copy protection is a new and emerging area of research. It mainly deals with adding hidden messages or copyright notices in digital video. This paper reviews various copy protection literatures for digital image and video watermarking.
REFERENCES
[1] [2] [3] Barni, M., Bartolini, & F., Piva,A., (2002) Managing copyright in open networks, IEEE Transactions on Internet Computing, Vol. 6, No. 3,pp. 1826. Liao, M., Lu, C. & Yuan, H.,(2001) Multipurpose watermarking for image authentication and Protection , IEEE Transactions on Image Processing, Vol. 10, No.10, pp. 15791592 . Akiyama, Tosihiro., Motoyoshi, Fumiaki., Nakanishi, Shohachiro. & Uchida, Osamu..:(2006) Hybrid Digital Watermarking for Color Images Based on Wavelet Transform, International Conference on Applied Computing, pp. 150-154. (2006) Ganic, Authors Emir., Eskicioglu & Ahmet M. (2004) Robust DWTSVD domain image watermarking: embedding data in all frequencies, International Multimedia Conference, pp. 166 174. Choi, T. S., Choi, Y. H & Seong, Y. K, (2002) .Design and implementation of hard disk drive embedded digital satellite receiver with file management, IEEE Transactions on Consumer Electronics, Vol.48, No.1, pp125-130 Li ,Wei., Li, Xiaoqiang., & Xue, Xiangyang., (2003) An Optimized Multi-bits Blind Watermarking Scheme, Lecture Notes in ComputerScience, Vol. 2836, pp.360-369 . Huang, Jiwu., Zeng, Wenjun.,& Kang, Xiangui., (2008) Improving Robustness of Quantization- Based Image Watermarking via Adaptive Receiver , IEEE Transactions on Multimedia, Vol.10, No. 6, pp. 953-959. ( 2008) Boom, J. A., Cox, I. J., Kalker,T., Miller, M. L., Linnartz, J. -P. M. G. , & Traw, C. B. S.,(1999) Copy protection for DVD video, IEEE International Conference on Image Processing, Vol. No. 7, pp. 1267-1276. Depovere, F. G., Haitsma, J., Kalker,T., Linnartz, J. -P. M. G., Maes, M., & Talstra,J, (2000) Digital watermarking for DVD video copy protection , IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 47-57. Kalker, T. (1999) System issues in digital image and video watermarking for copy protection IEEE International Conference on Multimedia Computing and Systems, Vol.1, pp.562567. Choi, T.S., Choi, Y.H., Park,J.A., & Seong,Y.K , (2002) A hard disk drive embedded digital satellite receiver with scene change detector for video indexing , IEEE Transactions on Consumer Electronics, Vol. 48, No. 3, pp. 776-782 . Choi , Tae-Sun., Choi ,Yoon-Hee . & Seong, Yeong Kyeong., (2004) Scene-Based Watermarking method for Copy-Protection using Image complexity and motion vector 70
[4]
[5]
[6] [7]
[10]
[11]
[12]
International Journal of Computer Science & Engineering Survey (IJCSES) Vol.3, No.1, February 2012 Amplitude , IEEE International Conference on Acoustics, Speech and Signal Processing, Vol.3, pp. 409-12 . Boato, G., Fontanari,C. & De Natale, F.G.B., (2006) An Improved Asymmetric Watermarking Scheme Suitable for Copy Protection,, IEEE Transactions on Signal Processing, Vol. 54, No. 7,pp. 2833-2834 . Aydn Alatan,A., Koz, Alper. & Cigla, Cevahir. , (2010) Watermarking of Free-view IEEE Transactions on Image Processing, Vol.19, No. 7, pp. 1785-1779 .
[13]
[14] Video,
Authors Dolley Shukla was born in chhattisgarh, India in 1975.She received the B.E. degree from Pt. Ravishankar University, M.Tech. degree from M.A.N.I.T., Bhopal in Electronics & Telecommunication engineering in 1999 and in 2006 respectively. She is currently pursuing the Ph.D. degree at the CSVTU, Bhilai , India. Dolley Shukla is currently Associate Professor at SSCET, Bhilai, India. Her research interests include Image Processing, Video Processing & Watermarking. Dr. Manisha Sharma was born in 1970. She received the B.E. from Barkhattullah University, Bhopal in 1992 , M.E. from Government Engineering College, Jabalpur Rani Durgavati University, Jabalpur in 1995 and Ph.D. from C.S.V.T.U., Bhilai, India in 2010. Presently she is working as a professor & Head of the department at, Bhilai Institute of Technology , Durg, CHHATTISGARH, India. Her research Interest includes Image Processing , Image Segmentation , Video Processing , watermarking and Authentication
71