23
1

Watermark

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Watermark

1

Page 2: Watermark

OutlineIntroduction, ApplicationsCharacteristics and classificationPopular techniques for watermarking

2

Page 3: Watermark

3

Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer.

Page 4: Watermark

4

Example

Page 5: Watermark

Watermarking Vs EncryptionEncryption involves document transformation

so that the contents of the document are not visible without a decryption key

Watermarking leaves the original file/image intact and recognizable

5

Page 6: Watermark

6

Page 7: Watermark

Digital Watermarking ApplicationsOwnership Assertion

‘A’ uses a private key to generate a watermark and embeds it in the document

‘A’ makes the watermarked image publicly available ‘B’ claims that he owns the image derived from the public

image ‘A’ produces the unmarked original and establishes the

presence of ‘A’s watermark

Fingerprinting Used to avoid unauthorized duplication and distribution. A distinct watermark (a fingerprint) is embedded in each copy

of the data. If unauthorized copies are found, the origin of the copy can be

determined by retrieving the fingerprint.

7

Page 8: Watermark

Digital Watermarking Applications (2)Authentication & integrity verification

Watermarks should be able to detect even the slightest change in the document.

A unique key associated with the source is used the create the watermark and then embed in the document.

This key is then used to extract the watermark and the integrity of the document verified on the basis of the integrity of the watermark.

8

Page 9: Watermark

Digital Watermarking Applications (3)Content labeling

Bits embedded in the data, comprise an annotation, giving some more information about the data.

Digital cameras annotate images with the time and date, when the photograph was taken.

Medical imaging machines annotate images (X-Rays) with patients name, ID.

9

Page 10: Watermark

Digital Watermarking Applications (4)Usage control & Copy protection

Digital watermark inserted to indicate the number of copies permitted.

Every time a copy is made the hardware modifies the watermark and at the same time it would not create any more copies of the data.

Commonly used in DVD technology.Content Protection

Content owner might want to publicly and freely provide a preview of multimedia content being sold.

To make the preview commercially useless, content is stamped with visible watermarks.

10

Page 11: Watermark

Characteristics of Digital Watermarks Readily Detectable: the data owner or an independent control

authority should easily detect it. Unambiguous: retrieval of it should unambiguously identify

the data owner.Robust: difficult to remove for an attacker, who would

like to destroy it in order to counterfeit the copyright of the data. Moreover, removal of it should cause a considerable degradation in the quality of the data.

Visible watermarks should be visible enough to discourage theft.

11

Page 12: Watermark

Digital Watermark ClassificationBased on visibility of watermarks

- Visible Watermarks

- Invisible Watermarks

Based on the content to be watermarked

- Text Watermarking

- Image, Audio, Video Watermarking

12

Page 13: Watermark

13

Techniques for Texts

Text Line Coding: Change the spacing between lines.

Word-shift Coding: Change the spacing between words.

Character Encoding: Alter the shapes of characters.

Page 14: Watermark

14

Page 15: Watermark

15

Word-shift coding example

Page 16: Watermark

Easily defeated…Retyping the text destroys the watermarkWord processors change the spacing

between words and linesCharacter encoding can be defeated by

changing the font

16

Page 17: Watermark

Techniques for ImagesSpatial Watermarking: Just change some of the values

of the pixels in the lower bit plane; e.g., Change some of the bits from 1 to 0 or 0 to 1.

Frequency Domain Watermarking: First convert the image to the frequency domain and then apply the watermark in the low frequency regions.

17

Page 18: Watermark

Checksum Technique for imagesWatermark is formed from the 7 most significant bits of

each pixel.Eight 7-bit segments (from eight different pixels) are

concatenated and the final checksum is thus 56-bit.Locations of the pixels that are to contain one bit each of

the checksum are randomly chosen.These pixel locations along with the checksum form the

watermark, W.Last bit of each pixel is then changed to the corresponding

checksum bit.

18

Page 19: Watermark

19

Page 20: Watermark

20

Bavarian couple

Original Watermarked Version

Page 21: Watermark

Advantages/DisadvantagesEmbedding the checksum only changes (on average) half

the number of pixel. So less visual distortion.Can hold multiple watermarks as long as they don’t

overlap.Extremely simple and fast.Extremely fragile. Any change to the checksum causes the

failure of the verification procedure.Forger could replace a section with another one of equal

size and checksum.Entire watermark can be removed by removing the LSB

plane. Can’t survive lossy compression.

21

Page 22: Watermark

ConclusionFirst generation of copyright marking

schemes is not strong enoughExisting schemes provide only limited

measures of markingCan only meet few requirements at a time

Tradeoff - Bandwidth vs. robustnessNo single problem but a constellation!

Real problem: watermark restoration

22

Page 23: Watermark

Q&A

23