You are on page 1of 6

DIGITAL WATER MARKING

AND
IT’S APPLICATION IN VARIOUS MEDIA TYPES
G.Leela Sankar, III B.Tech, ECE, P.Jnananand, III B.Tech, ECE,
JNTUCE, Kakinada. JNTUCE, Kakinada.

1. ABSTRACT watermarking is classified basing on the ability to


In the wake of increasing copyright misuses, several withstand attacks, into robust and fragile
new technologies are developed to preserve the watermarking. Fragile watermark is capable of
authentication of information. Digital water marking detecting any minute transformation made to the
is one of them. It is a technique that allows us to add watermarked content of the host signal. It is easy to
hidden copyright notices, verification messages or embed this into the signal. This can be accomplished
any other useful information to the original signal. by accommodating it in the unimportant portions of
The hidden message can be a group of bits that the original data. But it cannot withstand wide range
describe something about the signal or about the of attacks. For the applications wherein wide range of
genuine author of the signal. The description can be attacks needs to be tolerated, a robust watermark is
about the name, place or something related to this. used.
Much of the research wo rk has been done in the field
of digital watermarking in the recent period of time.
In this paper, a brief description about various digital
water marking techniques for different media types is Original watermark
given. Watermark insertion and watermark decoding F
is described as well. The watermarking techniques
described for various media types include audio
water marking, video water marking, image water Watermarked
marking and text water marking. Some of the signal
Watermark F’ Distortion
properties and applications are also discussed. embedding medium

2. INTRODUCTION
To begin with, the meaning of “watermark”(on a Corrupted
paper) is a mark that is not perceptible to the naked signal
eye in ordinary circumstances but is visible when Actual F’’
focused through a special light. A digital water Host H
marked signal is also difficult to differentiate from
the original signal normal circumstances. In fact, Watermark
there should be no detectable difference between the decoding
original signal and watermarked signal. The desire to
communicate secretly is a human trait that dates back
to the earliest times. This led to the invention of
steganography at first and encryption later on. Before Decoded
Confidential signal
the origin of watermarking technique, there were two
key F”’
techniques called “steganography” and “encryption”.
C
Steganography takes its origin from the old Greek
language that means ‘cover writing’. It is nothing but,
a way of transmitting hidden messages between two Fig 1: block diagram of a watermarking system
persons. Encryption is used to provide
communication privacy and deny access to Robust watermarking techniques are especially useful
unauthorized persons from damaging the content. for military applications, authentication, copyright
The usage of the watermark does not limit the usage protection and so forth. Herein, the watermark is
of the original file in any way. Watermarking can placed in the significant portion of the data to be
basically be classified into visible and invisible watermarked.
watermarking. Visible watermarking obviously All in all, the digital watermarking techniques are
includes usage of logos, trademarks and other related expected to withstand assails including compression,
things for unique identification. Invisible
A/D and D/A conversion, linear and non-linear the power contained in each frame, which is
filtering and additive noise as well. useful in the later parts of the method.
• From the above calculations, the low
frequency components are removed from
3. WATERMARKING FOR VARIOUS the signal.
MEDIA TYPES TECHNIQUES • Now, the watermark is placed in the low
frequency region, where the low frequency
3.1 Digital audio watermarking components are removed earlier on.
This finishes the process of inserting the
Here in, the watermark i.e. the digital audio watermark in the audio file. Now that the
watermark consists of the information pertaining not process of insertion is accomplished, the user
only to the creator of the audio information that could has to extract the watermark and get it verified
be any one of several forms of song, music etc., but with his license to access the information in the
also to the authenticated user of the audio audio file. The process of extraction of
information. This allows that particular information watermark is similar to the process of inserting
to be used by only the authorized user and no one the watermark as well.
else. The watermark can also be used for secondary
applications other than authentication. e.g. providing
information about the song, album, style of tunes, etc. water
This watermark is useful in voice conferencing halls marked Partitioning Ananlysis
signal into frames using FFT
to indicate the person who is speaking at the moment.
This application can be extended to videoconferences
as well.
The method of inserting watermark consists of Carrier
concealing the watermark in the low frequency processing
components of the message signal (audio signal), so
that the insertion of watermark is not noticeable by
the human ear.
Fig 3. Block diagram for removal of watermark
from the audio watermarked file.
Partitioning Analysis for
Message Into frames spectral comp. Ø The watermarked signal to be processed is
Signal subjected to framing of some finite duration.
A This amount of time must be the same as
that of duration during insertion process.
Elimination of low Ø Once again, spectral analysis is carried out
frequency comp. using techniques such as FFT, to calculate
componenco the low frequency components and the
power constituted in each frame as well.
Ø From the above analysis, the power
Insertion of contained in the low frequency components
watermark is observed which determines the
Watermarked watermark.
signal
Aw Ideally, this watermark should be exact
reproduction of the original watermark that was
Fig 2.block diagram for audio watermark insertion inserted during insertion process. This is
subje cted to certain constraints like power in
• At first, the audio signal to be processed is each frame.
partitioned into some frames, allotting a
finite time interval to each frame.
• Following this, analysis is done to calculate
the spectral components, which is 3.2 Digital video watermarking
accomplished using FFT, more often than
not. This process also allows us to find out A watermark inserted in a video signal can be used
for DVD copy protection. First of all, the watermark
should satisfy the requirements of strength and space required for a digital form of the video signal.
imperceptibility. Besides this, it can be bestowed on This is essential to meet the bandwidth requirements.
to convey the information to restrict copying in many So it is necessary that the watermark signal be
ways such as copy never i.e. the DVD is copy inserted directly into this signal, which in compressed
protected, copy no more i.e. it is possible to copy a form without having to decode the video signal to
finite number of times, copy liberally i.e. it can be reduce intricacy.
copied any number of times, copy only once. The
design depends upon the content in the DVD.A
general process of digital video watermarking
consists of inserting a group of bits along with the Received signal Extraction
video frame to be transmitted. The process of process watermark
insertion of watermark is through a ‘hidden key’ that
is known to the transmitting person and the receiving
person as well.
Hidden key

Fig 5. Extraction of watermark from watermarked


signal
Video
watermarking
actual video signal process watermarked This is accomplished by changing the span of the
signal to be codes and subsequently inserting the watermark. This
transmitted
eases the insertion process. The drawback to this
watermark
process is that the watermark is vulnerable to remove
entirely at the time of detection. To make the
hidden key
watermark stable even after detection, the watermark
is inserted by imposing energy differences between
different parts of a video signal.

Fig 4.video watermark insertion


3.3 Image watermarking:

Actual video signal refers to a single image of a For watermarking a still image, the watermark is
video sequence. directly inserted on to the picture information itself
Now that, the watermark is inserted into an image of such as colour, brightness, and luminescence etc. the
a video sequence, it is susceptible to wide range of watermark may be inserted directly on to the pixels,
attacks in the channel through which it is transmitted. which are either in the spatial domain or in the
These attack could include deliberate attacks and transform domain. Earliest form of spatial domain
attacks by chance, i.e. not deliberately done. Some of techniques consists of inserting a finite number of
the deliberate attacks are reducing frames, conspiracy sequences of bits into the least significant data of the
and geometric attacks. Herein, the signal is not host signal. This type of insertion provides for
completely damaged or distorted beyond use, for the efficient visible insertio n technique. Another
pirate who attacks thus would like to use it anyway. advantage of using this technique is that the
Other range of attacks that the signal could suffer is implementation requires very low cost. Later on this
those that arise from the errors due to transmission technique was extended to two dimensions as well.
and also due to errors generated during processing of This also proved to be an effective fragile
the signal. Now, the process of extraction or removal watermarking technique. While decoding, a
of watermark is an intricate process. This process correlation detector is used for the retrieval of
consists of extraction of watermark from the received watermark. Another method where a correlation
watermarked signal, provided the ‘hidden key’ is detector is used does the watermarking by
known. introducing a texture-based watermark into the
By the time the signal arrives at the region, which is quite identical to the original image.
watermarking process, it might in a compressed form This enhances the transparency between the
i.e. it might have undergone compression techniques. watermarked and the actual image.
Compression is a technique that reduces the storage
Watermarking the image in transform domain comes 4. WATERMARK INSERTION:
up with many advantages like capability of
withstanding the compression techniques. Mid frequency components are chosen for
embedding the watermark in a simple way, owing to
3.4 Text watermarking: the shortcomings with the low frequency components
and high frequency components. The difficulty with
Text watermarking is the process of inserting the low frequency components is that they are highly
watermark into the text for preserving the creator’s susceptible to distortion. The high frequency
identity. This is especially applicable to such components do not bear much of the information
valuable texts such as poetry. An earlier form of reliably, since their removal from the actual signal
watermarking the texts was accomplished by does not affect the signal’s quality too much. The
inserting spaces in specific parts of the text. The watermarking process is a process known to all, thus
disadvantage associated with this form of the safety of the signal completely depends up on the
watermarking was that it was quite easy to remove hidden key (confidential key ‘C’ shown in the Fig 1).
the watermark. Later on, watermarks were placed in This key ‘C’ determines the sequence of bits, which
the text that depends on linguistic properties like are to be embedded into the host signal. The key acts
synonyms, sequence of words etc. minor in such a way that, it would be difficult (almost
modifications are made to characters, and such impossible) to recover the original signal without
characters are used for watermarking. Text knowing the confidential key ‘C’. There are simple
watermarking schemes are applicable to any type of additive watermarking methods, which can be
texts from usual word documents to PDF files. At represented using simple mathematical equation:
detection stage, the watermark is removed by F’= H + P
processing which involves the correction for noise, Where F’ is the watermarked signal, ‘H’ is the host
and distortion introduced, if any (during the insertion signal (from fig 1). The new signal ‘P’ is nothing but
process) as well. This scheme protects texts like the signal originating from the hidden key ‘C’ and the
poetry well as, the changes brought about in the text original watermark ‘F’. This method of
will damage the worth of it. This is also resistant to representation is not applicable to all embedding
attacks like photocopying because these do not alter processes. In some of the processes, the properties of
the watermark. the host signal are used for the embedding process.

5. WATERMARK DECODING:

1. FUNDAMENTAL ‘Detection’ and ‘identification’ are not the same. The


method of deciding about whether a signal received
contains a watermark or not is ‘detection’. But,
identification is the actual process of decoding the
unique watermark from a finite number of possible
2. FUNDAMENTAL choices. Two kinds of errors could occur at the
detection. The first one is detection of a watermark in
the received signal when it really does not exist. The
second one is quite opposite to this. Herein, the
Fig 6. Diagram showing changed ‘N’(character watermark, which inherently exists in the received
alteration). data, is not detected. Synchronization failure between
. watermark embedding and detection process could
1. Here the word “fundamental” is printed in disable the entire communication process. This could
the ordinary way. result in attacks on the signal.

2. It shows the word “fundamental”, in which


the letter ‘N’ is modified slightly. 6. APPLICATIONS:

Some of the additional applications of digital


watermarking are broadcast monitoring, usage of
contractual watermarks for special purposes, secret
communication and copy control.
Broadcast monitoring: another. Consequently, the signal is made to
Watermarks are used in broadcast monitoring by withstand attacks, which may differ from one
inserting watermarks in the message that is to be application to another. Where there is only a
transmitted. This is done before signal (audio or necessity to know whether any distortion of signal
video) is broadcasted. has occurred and nothing else, the strength is not at
all a constraint. Instead, the watermark may be a
Contractual watermarks: fragile one. The situation may be quite different in
These types of watermarks are also called some other cases. One such case is where the attacks
fingerprints. One of the applications of these is in the are quite capricious. Herein, the signal is
distribution of daily film copies. Many people and watermarked in such a fashion it can withstand every
organizations might be involved in the distribution of possible distortion.
a film. In this process, there could be possibilities of
leakage of certain copies. Placing a watermark in Tamper resistance:
every copy, which contains the information of the If there is a possibility of aggressive or
recipient, can prevent this. This doesn’t affect the antagonistic attacks, then the watermarked signal
actual version of the copy, and it is possible to must be tamper resistant. Tamper resistance is
identify the person or source responsible for leakage, immaterial if there are slim chances of aggressive
if any. attacks. The watermarked signal must be tamper
resistant to attacks like passive, active, and
Secret communication: falsification attacks. In passive form of attacks, the
This was one of the earliest applications of attacker just likes to determine whether a watermark
watermarking technique. It is a process of transmitted is present in the signal or not. In contrast to this, an
secret messages in concealed form. Specially active attack is one in which the attacker tries to
designed programs are there to accomplish these remove the watermark from the watermarked signal.
tasks. There is yet another form of active attack, called
collusion attack wherein, the attacker tries to
Copy control: reconstruct the replica with no watermark from
Many watermarks do not actually prevent the different sets of copies with different watermarks. In
copying of content into which they are embedded, but falsification attacks, the attacker inserts another
serve as identification marks of the genuine owner of watermark into the genuine one, thereby, changing
it. But using certain mechanisms that detect the the identification of the copy.
watermarks and inhibit the copying of the
information, it is possible to preserve the integrity of Reliability:
the information. A watermarked signal may be considered to be
highly reliable, if the distortion caused by the
7. PROPERTIES: inclusion of watermark is quite unnoticeable by the
Some of the properties of the watermarking human eye.
techniques are strength, fidelity, cost involved, and
the tamper resistance. Cost involved:
Depending upon the application, the number of
Strength: watermark embedders and watermark detectors vary.
Strength is an important parameter because it Their working speeds vary as well according to the
decides the capacity of the watermarked signal to type of application. The cost involved thus varies
withstand the wide range of attacks. Especially, the greatly depending up on all these constraints.
image and video signals need to tolerate the attacks
including the geometric ones. Besides, it should be 8. CONCLUSION:
able to endure ordinary attacks like A to D
conversion and lossy conformations. More often than Digital watermarking is an outstanding technology
not, a watermarked signal is expected to endure that can serve a wide range of applications in various
common processing transformations only during the media types. But, the employment of schemes
time interval between the insertion and decoding of depends upon the requirements that may vary widely.
the signal. The toughness of the signal is not limited A sound knowledge of communication techniques
to any one constraint, but it can be extended to many and signal processing methods is essential for
others. It means, a signal, which is capable of efficient development of watermarking techniques.
withstanding an attack, may not be able to tolerate Besides this, the attacks that the signal is expected to
endure the assessment of the amount of distortion
that the signal suffered which in turn determine the
efficacy of the system and the effective cost involved
need to be taken into consideration while designing
watermarking technique for a particular application.
Thus the standards for all the applications don’t
remain alike.

9. REFERENCES:

1. Digital communications,
By Bernard Sklar.

2. Digital image processing


By Ganzaly and Woods.

3. JPEG based image compression for low bit rate


coding
By P.P.Gandhi.
4. www.scholar.google.com

You might also like