You are on page 1of 42

Digital Watermarking

by Chaelynne M. Wolak wolakcha@scsi.nova.edu

A paper submitted in fulfillment of the requirements for DISS 880 Final Deliverable

School of Computer and Information Sciences Nova Southeastern University January 2001

Abstract
Copyright abuse is the motivating factor in developing new encryption technologies. One such technology is digital watermarking. The focus of this PowerPoint presentation is to detail digital watermarking for multimedia applications. Areas covered are definition of digital watermarking, purpose, techniques, and types of watermarking attacks. Lastly, the current laws in place for digital copyright and the future of digital watermarking technology are briefly detailed.

ii

Table of Contents
Abstract Chapters 1. Introduction Problem Statement and Goal Relevance and Significance Barriers and Issues Approach Milestones 2. Review of Literature Definition of Digital Watermarking Purpose of Digital Watermarking Digital Watermarking Techniques Types of Attacks Current Laws Future of Digital Watermarking 3. Methodology Product Criteria Marketing Plan Expectations 4. Results Development Process Authoring System Story Board/Flow Diagrams Problems Encountered Evaluation Criteria Evaluations User Profiles Results 5. Summary References 1 1 2 2 3 5 ii

5 5 6 8 9 11 12 12 13 14 15 15 16 16 18 19 20 21 22 29 30

Appendixes A. Design Phase Usability Questionnaire 32 B. Final Production Usability Questionnaire 35

iii

List of Tables
Tables 1. User Profiles 21 22 25

2. Results from Design Phase Usability Questionnaire 3. Results from Final Production Usability Questionnaire

iv

List of Figures
Figures 1. Digital Watermarking PowerPoint Presentation Storyboard . 17

Chapter 1 Introduction
This project consists of two deliverables. A ten-minute PowerPoint presentation is developed and distributed for those that prefer to have an interactive approach to learning about digital watermarking. In addition, all supporting documentation of developing the PowerPoint presentation is provided. The following introductory sections describe the problem statement and goal, relevance and significance, barriers and issues, approach, and a timeline of the milestones. Problem Statement and Goal The desire for the availability of information and quick distribution has been a major factor in the development of new technology in the last decade (Zhao, Koch, & Luo, 1998). There is the increased use of multimedia across the Internet. Multimedia distribution has become an important way to deliver services to people around the world (Arn, Gatlin, & Kordsmeier, 1998). It is commonly applied in Internet marketing campaigns and electronic commerce web sites. Due to the growing usage of multimedia content on the Internet, serious issues have emerged. Counterfeiting, forgery, fraud, and pirating of this content are rising (Lan & Tewfik, 1999). Virtually anyone with a sound card, scanner, video frame grabbers, or multimedia authoring systems allow them to incorporate copyrighted material into presentations, web designs, and Internet marketing campaigns. Consequently, copyright abuse is rampant among multimedia users who are rarely caught (Gatlin, Arn, & Kordsmeier, 1999).

2 This copyright abuse is the motivating factor in developing new encryption technologies (Zhao et al., 1998). One such technology is digital watermarking. The focus of the PowerPoint presentation is to detail digital watermarking for multimedia applications. Areas covered are definition of digital watermarking, purpose, techniques, and types of watermarking attacks. Lastly, the current laws in place for digital copyright and the future of digital watermarking technology are briefly detailed. This PowerPoint presentation could be used to further ones understanding of one type of multimedia encryption techniques. Relevance and Significance Multimedia usage has developed from the need in satisfying human desires in societies. It is this desire that relies on communication, personal interaction, and entertainment (Lan & Tewfik, 1999). Thus, the emphasis has mostly been placed on making information available and on transmitting and manipulating that information. Protecting information and content has not received the attention that it deserves (Zhao et al., 1998). It has only been recently that copyright laws regarding multimedia usage have been established. Any extensive research in this area is non-existent (Arn et al., 1998, December). However, even the current copyright laws are inadequate for dealing with all this digital data (Memon & Wong, 1998). Digital watermarking seems to be the only potential encryption technology to provide protection even after data is decrypted (Zhao et al., 1998).

3 Barriers and Issues Several barriers prevent digital watermarking from being effective and widespread. First, there is not a foolproof protection scheme while making the watermarks imperceptible. Thus, absolute robustness is impossible (Zhao et al., 1998). Second, it is difficult to offer an off-the-shelf solution to the mass market. Although, there is significant interest in this technology from OEMs and system integrators, there is no infrastructure or protocols. Besides, the legal status of watermarks used as evidence in lawsuits involving intellectual property has not been tested (Zhao et al., 1998). Lastly, out of fear of piracy, many professional photographers, artists, and other content creators still do not put their work out in digital format. Thus, the market for this new encryption technology is not widespread. Usually a new technology goes through a dormancy period before widespread adoption (Zhao et al., 1998). Approach The goal of this project is to enhance an individuals understanding of digital watermarking for multimedia applications. Areas covered are definition of digital watermarking, purpose, techniques, and types of watermarking attacks. Lastly, the current laws in place for digital copyright and the future of digital watermarking technology are briefly detailed. The first step in accomplishing this was to perform a thorough search into digital watermarking. Next, the preliminary proposal was written. It included the following three chapters. Chapter one described the deliverable, problem statement, relevance, barriers

4 and issues, and milestones. The review of literature of digital watermarking was chapter two. Chapter three consisted of the product criteria, marketing plan, and expectations. To complete the project, the full development process of the PowerPoint presentation was detailed. During the development of the PowerPoint presentation, two individuals were asked for their input. Comments and observations were incorporated into the final PowerPoint presentation. These same individuals were asked for their comments on the final design. The development process and results from these evaluations were presented in chapter four. Chapter five concluded with a summary. Milestones The following is a summary of the milestones for this project. The idea for the Digital Watermarking PowerPoint presentation was decided in July 2000. Refinements to chapter one was done on Sunday, October 8, 2000. Chapters two and three were completed on Sunday, October 15, 2000. The preliminary proposal was submitted before Friday, October 20, 2000. The development of the PowerPoint presentation was started in November 2000 with the initial design being complete on December 31, 2000. Evaluations of the initial design was done on January 15, 2001. These evaluations were incorporated into the final Digital Watermarking PowerPoint presentation. The final product was available at the end of January 2001.

Chapter 2 Review of Literature


The idea of watermarking can be dated back to the late Middle Ages. The earliest use has been to record the manufactures trademark on the product so that authenticity could be easily established. The Government uses it for currencies, postage stamps, revenue stamps, etc (Berghel, 1998). Now due to the information and computer age, digital watermarking is being expanded. Definition of Digital Watermarking Digital watermarking is a process of embedding unobtrusive marks or labels into digital content. These embedded marks are typically imperceptible (invisible) that can later be detected or extracted (Yeung, Yeo, & Holliman, 1998). The concept of digital watermarking is associated with steganography. Steganography is defined as covered writing. It has a long history of being associated with methods of secret communication. Steganography does not immediately arise the suspicion of something secret or valuable. Instead, it hides an important message in an unimportant one. Therefore, digital watermarking is a way to hide a secret or personal message to protect a products copyright or to demonstrate data integrity (Voyatzis & Pitas, 1999). Purpose of Digital Watermarking Watermarks added to digital content serve a variety of purposes. The following list details six purposes of digital watermarking (Memon & Wong, 1998). Ownership Assertion to establish ownership of the content (i.e. image)

6 Fingerprinting to avoid unauthorized duplication and distribution of publicly available multimedia content Authentication and integrity verification the authenticator is inseparably bound to the content whereby the author has a unique key associated with the content and can verify integrity of that content by extracting the watermark Content labeling bits embedded into the data that gives further information about the content such as a graphic image with time and place information Usage control added to limit the number of copies created whereas the watermarks are modified by the hardware and at some point would not create any more copies (i.e. DVD) Content protection content stamped with a visible watermark that is very difficult to remove so that it can be publicly and freely distributed Unfortunately, there is not an universal watermarking technique to satisfy all of these purposes (Memon & Wong, 1998). The content in the environment that it will be used determines the digital watermarking technique. The following section describes some digital watermarking techniques. Digital Watermarking Techniques The most important properties of any digital watermarking techniques are robustness, security, imperceptibility, complexity, and verification. Robustness is defined as if the watermark can be detected after media (normal) operations such as filtering, lossy compression, color correction, or geometric modifications. Security means the

7 embedded watermark cannot be removed beyond reliable detection by targeted attacks. Imperceptibility means the watermark is not seen by the human visual system. Complexity is described as the effort and time required for watermark embedding and retrieval. Lastly, verification is a procedure where by there is a private key or public key function (Dittmann, Mukherjee, & Steinebach, 2000). Each of these properties must be taken into consideration when applying a certain digital watermarking technique. The following sections describe a few of the most common digital watermarking techniques. Spatial and Frequency Domain Spatial and frequency domain watermarking are applied to graphic images and text. Spatial domain watermarking slightly modifies the pixels of one or two randomly selected subsets of an image. Modifications might include flipping the low-order bit of each pixel. However, this technique is not reliable when subjected to normal media operations such as filtering or lossy compression (Berghel, 1998). Frequency domain watermarking technique is also called transform domain. Values of certain frequencies are altered from their original. Typically, these frequency alterations are done in the lower frequency levels, since alterations at the higher frequencies are lost during compression. The watermark is applied to the whole image so as not to be removed during a cropping operation. However, there is a tradeoff with the frequency domain technique. Verification can be difficult since this watermark is applied indiscriminately across the whole image (Berghel, 1998).

8 The Zhao Koch Algorithm and The Fridrich Algorithm The Zhao Koch Algorithm and The Fridrich Algorithm watermark techniques are applied to MPEG videos. The Zhao Koch Algorithm embeds a copyright label in the frequency domain of the video. The algorithm randomly selects three coefficients from the discrete cosine transform encoded block and manipulates them to store a single bit of information using a secret key. This single bit information can be the name or address of the owner. The watermark can be easily embedded into the video with minimal operation. Thus, complexity is not an issue. However, the Zhao Koch Algorithm watermark technique is not robust against normal media operations such as scaling or rotation (Dittmann, Stabenau, & Steinmetz, 1998). The Fridrich Algorithm watermark technique is where a pattern is overlaid in the low frequency domain. The pattern is created using a pseudo random number generator and a cellular automation with voting rules. The pseudo random number generator creates a white and black initial pattern that is the same size as the image. A cellular automation with voting rules is then applied until there is a convergence to fixed points. The voting rule randomly patches the pattern into these connected points. Thus, the pattern is now overlaid into the image. This algorithm is resistant to normal media operations. However, verification using this algorithm is not reliable. This is because the watermark technique does not include detail information about the owner when the pattern is created and overlaid (Dittmann et al., 1998). Attacks Digital watermarking does not have the same capability or level of security as data encryption. It does not prevent the viewing or listening of content, nor does it

9 prevent accessing that content. Therefore, digital watermarking is not immune to hacker attacks (Yeung et al., 1998). The following are some intentional attacks on watermarks (Cox, Miller, & Bloom, 2000). Active Attacks hacker tries to remove the watermark or make it undetectable. An example is to crop it out. Passive Attacks hacker tries to determine whether there is a watermark and identify it. However, no damage or removal is done. Collusion Attacks hacker uses several copies of one piece of media, each with a different watermark, to construct a copy with no watermark. Forgery Attacks hacker tries to embed a valid watermark of their own rather than remove one. Distortive Attacks hacker applies some distortive transformation uniformly over the object in order to degrade the watermark so that it becomes undetectable/unreadable (Collberg & Thomborson, 1999). These intentional attacks are just one of the barriers of why authors do not put their works into digital format. However, the government has stepped in to help these authors by establishing new laws. Current Laws There are three main laws concerning digital copyright. They are the Digital Millennium Copyright Act (DMCA), the Collections of Information Antipricay Act, and changes to Article 2B of the Uniform Commercial Code. Each of these laws is briefly described below.

10 Digital Millennium Copyright Act (DMCA) The Clinton Administration established this policy by making online service providers (OSPs) responsible for guarding against copyright infringements. However, major OSPs and telephone companies argued that it was technologically and economically infeasible to monitor all user activities. Therefore, a compromise has been established (Samuelson, 1999). Under the Digital Millennium Copyright Act, OSPs can qualify for exemption of liability by taking the following steps. The following steps are termination of service to repeat offenders, accommodating standard technological measures adopted by copyright industries to protect works, and abide by removing material from their system when notified of copyright infringement. This law was passed in September 1998 (Samuelson, 1999). Collections of Information Antipiracy Act This bill would protect the intellectual property in databases. Currently copyright does not protect all data compilations, but only those that exhibit sufficient creativity in the selection and arrangement. For example, the white pages are not copyright protected. However, many private companies feel that data complied should be. However, due to strong opposition from the scientific and educational communities in the United States, this law was never passed (Samuelson, 1999). Article 2B of the Uniform Commercial Code Article 2B regulates all information as it relates to computer information transactions. Thus, it would apply to multimedia products, software licensing, and

11 interactive services. However, there is much controversy over this proposed law. This is why it is still not passed (Samuelson, 1999). Future of Digital Watermarking Digital information can easily be disseminated and copied via global networks. Due to this ease, challenges regarding digital information have created a need for more copyright laws. However, laws cannot be the only entity required to protect digital works. Digital watermarking and its technological advancements should continue to be researched and developed. The future of digital watermarking relies on setting standards and creating applications so that creators of digital content can easily implement it.

12

Chapter III Methodology


Product Criteria (Test Plan) The main purpose of the Digital Watermarking PowerPoint presentation is to provide an interactive learning experience. This presentation accomplishes the following items: Provides an enjoyable learning experience using multimedia content Makes it easier to study in depth on digital watermarking by having all resources in one central area Provides a more clear overview of digital watermarking versus having the user read various sources Allows users to learn at their own speed about digital watermarking

These objectives are complied based on various readings regarding multimedia learning. The processes that were used to validate these objectives were the following: Two qualitative measures an usability questionnaire for the initial design phase and an usability questionnaire for the final production The target audience is a vast resource. Many potential users would be very interested in the Digital Watermarking PowerPoint presentation. They include content creators (i.e. artists, authors, movie studios), content providers (i.e. libraries, professional photographers), electronic commerce and graphic software vendors, manufacturers of digital still images, video camera, and digital video discs (DVDs) (Zhao et al., 1998). In essence, it is anyone who creates something and would like it copyright protected.

13 The hardware requirements for the Digital Watermarking PowerPoint presentation include having a Pentium computer with at least 64 MB of RAM and a CD-ROM drive. The software requirements include Microsoft Windows 98, Microsoft PowerPoint 2000 and access to the Internet. Marketing Plan In this digital age, information and/or created works can easily be found and disseminated globally. The Internet has opened the door where it is easy to download or use other individuals works. Therefore, in order to protect the digital works of these creators, a Digital Watermarking PowerPoint presentation is available to inform these creators there are ways to protect their works from copyright abuse. A PowerPoint 2000 presentation is available in two forms: downloadable from the Internet from various websites including those companies who specialize in digital watermarking and CDROM. The downloadable version of the PowerPoint presentation is still being reviewed with many digital watermarking companies. It is hopeful that approval will be given within the next two months. When permission is received, this document will be revised listing those sites where the presentation can be downloaded. If a CD copy of the presentation is needed, please send a request with a check of $4.95 for shipping and handling to the following address: Digital Watermarking PowerPoint Request PMB 325, 13957 Hall Rd. Shelby Twp., MI 48315

Upon receipt of the request, it will be sent out within 48 hours.

14 Expectations The creation of the multimedia PowerPoint presentation is a legitimate solution to helping targeted users understand digital watermarking. The trend towards learning is one of asynchronous, just-in-time, and instruction delivered for which a multimedia PowerPoint presentation is suited (Zemke, 1998). The PowerPoint presentation will be structured and provide adequate guidance, therefore it should provide an effective forum to learning about digital watermarking. However, there are some potential disadvantages to using a PowerPoint presentation to learn about digital watermarking. First, not all targeted users are familiar with computers or how to go about using the Internet. Second, some targeted users prefer to learn by having a professor teach or by experimenting with an actual application. Lastly, the PowerPoint presentation may not address the target user needs, thus it could fall short of their expectations (Zemke, 1998).

15

Chapter IV Results
This chapter details the development process of the Digital Watermarking PowerPoint presentation. It also details the results from two usability evaluations one during the design phase and one for the final production of the presentation. Therefore, this chapter is divided into three main sections. They are the development process, the evaluation criteria, and the usability evaluation results. Each of these is detailed below in their respective section. Development Process The development process of the Digital Watermarking PowerPoint presentation included many hours of searching on the Internet for the right music and graphics. However, to be able to search efficiently, the author decided to apply a common look and feel to her presentation. Therefore, she needed a theme. A theme is a specific subject/topic where every slide has similar design and format so it appears to be all tied together in a professionally designed color and graphic scheme (Wagner & Callihan, 1999). She believed Digital Watermarking had a mystery feel. Therefore, from her old childhood days, she could think of no one else but the Pink Panther. Now that she had a theme, she needed to choose her multimedia authoring software and determine some type of story flow. The next subsections detail the reason behind the authoring system she chose and a flow chart of her storyboard for this presentation. Lastly, there is a subsection on the problems encountered during the development of the Digital Watermarking PowerPoint presentation.

16 Authoring System Chosen. The goal of this presentation is to provide an interactive approach to learning about Digital Watermarking. In teaching, one has to use text to convey a point. Since there is quite a bit of text in this multimedia presentation, one must chose an authoring package that treats text as words and can be processed by it (Tannenbaum, 1998). Therefore, PowerPoint 2000 is selected as the authoring system. In addition, another reason for selecting PowerPoint 2000 is this program is the standard throughout DaimlerChrysler. It would benefit the author of this paper to learn and be able to use this program for other business related presentations. Storyboard/Flow Diagram. Storyboarding is a process of laying out a presentation and/or web site. In some respects, a presentation can be thought of as developing a web site. Both aim to convey a point/understanding. Storyboarding helps focus on the relationships between the various slides and other menu items within the presentation. In addition, it aids in navigation design and structure (Felke, 1999). Figure 1.0 is the storyboard for the Digital Watermarking PowerPoint Presentation.

17 Figure 1.0. Digital Watermarking PowerPoint Presentation Storyboard.

Introduction
Pink Panther Theme

Selection Menu

Obtain Required Software

Pink Panther Story

Knowledge Center

Company Websites

Demo Digital Watermarking Software

Continuation of Story

Watermarking Definition

Purpose of Digital Watermarking Digital Watermarking Techniques Types of Attacks

18 Problems Encountered. There were five main problems encountered during the development of the Digital Watermarking PowerPoint presentation. They were the following: synchronizing the music with graphic appearances; coloring of text to be readable at all times; aligning the text for the site map (i.e. main menu/home page); recording sound to have the same amplification; and trying to get the RealPlayer video to insert and play into the presentation. Synchronization is referred to as the control of the temporal component of a multimedia production (Tannenbaum, 1998). During the development, the author tried to have the beat of the Pink Panther song synchronized with the appearing of the pink circles in the introduction. She had modified the delay time of the pink circles many times. However, on various machines (i.e. especially those with slow computer speeds) they appeared out of synch. Therefore, the author decided on a delay that appeared to have synchronized with the beat of the song. In addition, during development the author had noticed some of the text hyperlinks hard to read after they had been clicked. Thus, she had customized the color scheme of the PowerPoint presentation so that active and followed hyperlinks were clearly visible at all times. Another problem encountered had to do with text alignment on the Site Map slide. The author had tried various spacing and tabbing methods for the text to appear aligned. However, if the titled changed then the spacing would affect the whole menu. In order to resolve this situation, she had placed all her text in a table with specific column width sizes. A table was the only layout tool available to maintain legibility and readability of

19 the text (Lynch & Horton, 1999). By using a table, she was able to establish column margins, which provided text consistency and alignment. A further problem that was encountered had to do with the recorded narration not being at the same level of amplification as the rest of the music within the presentation. Thus, during debug the author had noticed she had kept turning her volume up and down. Since this was a problem, she used a software program called Cool Edit 2000 to amplify all her narrated recordings by 250 percent. Lastly, one of the most frustrating problems was getting the RealPlayer movie file inserted in the PowerPoint presentation. PowerPoint had not recognize that type of file extension (e.g. .ram). It had only recognized .mov or .avi file extensions. Therefore, she had tried to use the HyperCam software. HyperCam will re-record a movie and save it as a .mov or .avi file. However, upon playback, HyperCam was only showing a black screen. Now she had to search for a program that would convert RealPlayer movie files into a file format that would be recognized. After many hours of searching and reading various web bulletin boards, she could not find a program that could convert that type of file. Therefore, she had created a hyperlink to where the file was located on the Internet. Now when a user clicks on it in the presentation, it will bring up the RealPlayer program and play the movie. Evaluation Criteria The evaluation criteria is as follows: Does the PowerPoint multimedia presentation allow the user to enjoy learning about Digital Watermarking?

20 Does the presentation provide a cohesive overview of Digital Watermarking? Does the presentation make it easy for the user to learn more about Digital Watermarking? Evaluations The author asked two volunteers to be the evaluators for her presentation during the December 2000 Cluster. She sent out the presentation and usability questionnaires via email with an option for those participants to opt out if they would like. The participants could view the presentation and answer the questionnaires when time permitted in their schedule. The completed questionnaires were emailed back to the author. In addition, the author thanked the participants for their time. The participants were given a fixed-response questionnaire with the option to provide any additional comments. The main purpose of this questionnaire was to gather information from the participants in order to clarify and deepen the authors understanding of the PowerPoint multimedia presentation strength and weaknesses (Rubin, 1994). A copy of the usability questionnaire for the design phase can be seen in Appendix A. A copy of the final production usability questionnaire can be located in Appendix B. Results from these questionnaires are detailed along with the analysis of them next. Does the presentation allow the user to learn at his/her own speed?

21 User Profiles. Table 1.0. User Profiles Characteristic Computer Experience Education Level Age Gender Learning Style Preference Education Major Authoring Software Experience Computer Interaction Experience Computer Processor Amount of RAM Authoring System used to view this presentation Participant 1 15 years Post Graduate 34 Female Visual and audio Information Systems Advanced PowerPoint user and developer GUIs, DOS based command lines 1 GHz 256 MB PowerPoint 2000 Participant 2 20 years Post Graduate 48 Male Online Information Systems Familiar with PowerPoint, Flash, Director, etc. GUIs, DOS based command lines 750 MHz 512 MB PowerPoint 2000

22 Results. Table 2.0. Results from Design Phase Usability Questionnaire Question 1. Does it appear you will be able to navigate through the presentation easily? Participant 1 Agree Participant 1 Comments As I move through the series I would like to know where I am in proportion to where I have been and where I am going. Also, once in the presentation, I would like to be able to click on a link to skip ahead or back. The theme is interesting and entertaining. Also, it is fun and easy to understand. NA Participant 2 Strongly Agree Participant 2 Comments NA

2. Do you like the Pink Panther theme for the presentation?

Strongly Agree

Strongly Agree

NA

3. Does it appear the presentation will have an appropriate amount of information that is conducive to learning about Digital Watermarking?

Strongly Agree

Agree

NA

23

4. Do you think the Agree introduction is too long?

5. Do you like the introduction (it is prior to the Site Map)? 6. Do you like the background color (i.e. pink/white)? 7. Does it appear that this presentation will make it enjoyable for you to learn about Digital Watermarking? 8. Do you think the presentation will allow you to learn at your own pace about Digital Watermarking? 9. Do you like the graphics/images proposed so far in the presentation?

Strongly Agree

Maybe just too many pink circles with the music, but I did have the option to skip the introduction and move ahead to the menu. I waited because I thought I might be asked to do something adjust speakers, etc. NA

Neither Agree/ Disagree

NA

Strongly Agree

Well done, cannot tell it is PowerPoint NA

Strongly Agree Strongly Agree

NA

Strongly Agree Agree

NA

NA

Strongly Agree

NA

Agree

NA

Strongly Agree

NA

Strongly Agree

NA

24

10. Do you think Strongly this presentation is Agree helpful in learning more about Digital Watermarking? 11. Do you have NA any other suggestions for this presentation (i.e. color, graphics, sound files, layout, etc)?

NA

Strongly Agree

NA

Before I opened it, I thought it was going to be a dry subject that would be hard to look at. It has me anxiously awaiting the finished version. Very good professional quality and entertaining.

NA

Looks Good!

Analyzed Results from Design Phase Usability Questionnaire Overall, the results of this usability questionnaire were good. The initial design appears to meet the evaluation criteria. However, there were some issues with the introduction and navigation. Participant 1 claimed the introduction was too long and too many pink circles. Participant 2 neither agreed/disagreed. Therefore, the author removed two of the circles from the introduction. This effectively shortened the introduction by ten seconds. Another comment in regards to the introduction from Participant 1 was waiting for some instruction to adjust her speakers or other computer peripherals. Thus, the presentation was modified with another slide at the very beginning to allow users to set their speaker sound. This had now become the title slide. Another issue Participant 1 noted was the navigation throughout the presentation. She had wanted to be able to skip or go back when she wanted. In addition, she had

25 wanted know where she was in relation to where she had been. The author modified the presentation to include a navigation area at the bottom of each slide. Included in this navigation area was being able to click to go to the Main Menu, Back, Forward, and Knowledge Center. In addition, if one of the links were clicked, it would change from a blue color to a pink color. Table 3.0. Results from Final Production Usability Questionnaire Question 1. Can you navigate through the presentation easily? Participant 1 Strongly Agree Participant 1 Comments I could return to main menu at any time and was presented with a clear outline of the flow of the presentation. It was extremely entertaining with a great theme and storyline. It was informative, covered pertinent information but was not overwhelming. Participant 2 Agree Participant 2 Comments It is very easy to navigate.

2. Do you find the presentation an enjoyable learning experience about Digital Watermarking? 3. Does the presentation have an appropriate amount of information that is conducive to learning about Digital Watermarking?

Strongly Agree

Agree

NA

Strongly Agree

Strongly Agree

NA

26

4. Do you think the Strongly introduction is too Disagree long?

5. Do you like the music in the presentation?

Strongly Agree

6. Do you like the background and text colors?

Strongly Agree

7. Does the presentation provide a cohesive overview of Digital Watermarking?

Strongly Agree

8. Do you think the Strongly presentation allows Agree you to learn at your own pace about Digital Watermarking?

No, because I could move on at anytime. Also, the presentation automatically advanced after a period of time. Yes it was appropriate to the theme and added interest and emotion to the presentation. Yes, the border of pink was soft and did not affect the area where content was displayed. The text was easy to read. The cohesive theme and flow of information were the strong points of this presentation and resulted in its ease of viewing and learning. The menuing system provided easy flow.

Neither Agree/ Disagree

NA

Strongly Agree

NA

Strongly Agree

NA

Strongly Agree

NA

Strongly Agree

NA

27

9. Do you like the graphics/images in the presentation?

Strongly Agree

Added to the theme and understanding of content. NA

Strongly Agree

10. Do you think this presentation is helpful in learning more about Digital Watermarking? 11. Is this final production what you expected based upon the initial design review (i.e. better, same, worse)?

Strongly Agree

Strongly Agree

The pink panther welcome screen was neat. NA

NA

12. Do you have NA any other suggestions for this presentation (i.e. color, graphics, sound files, layout, etc)?

NA It was even better than I expected. I like the way that voice was used for the main portion of the presentation but then not used for the more detailed levels. Also, the presentation was well divided into a superficial, mid-level, and detailed knowledge, which I thought was outstanding. No, it was NA fantastic.

It was what I expected. Looks good!

In the story, you may want the narration to start before all the graphics load.

28 Analyzed Results from Final Production Usability Questionnaire. Based on the second usability questionnaire, it appeared that the final production of the presentation was well liked. In fact, Participant 1 did not have any problems or suggestions for improvements. However, Participant 2 would have liked the narration of the story to start before all of the graphics loaded. This was possible with PowerPoint 2000, but there were some synchronization problems with getting everything to appear in proper order. In trying to make those modifications, sometimes the narration sound had overlapped with another sound in that same slide. Therefore, the author had modified those slides where only one sound played. Upon reflection, the author also thought of two other alternatives to the presentation. One was to have a replay button so the user could replay the narration in the story section. The second one was to reorganize the presentation so that the user had to load the required software before the actual presentation started instead of having a link at the site map screen. However, since she was unsure if her alternatives would be good, she had decided to leave the presentation the way it was when viewed by the two participants.

29

Chapter V Summary
Although only two usability studies were done, there should always be a way for a user to provide comments. After usage in the field, additional insight could prove useful in making the presentation better. In addition, it needs to be updated on a timely basis just like a web site. Digital Watermarking is constantly evolving and should be updated to reflect the latest material/technology in the field. Overall, the author found this an excellent learning experience. She believes this presentation is better than the last two she had done for the DISS 780 Multimedia class.

30

References
Arn, J., Gatlin, R., & Kordsmeier, W. (1998, December). Multimedia copyright laws and guidelines: Take the test. Business Communication Quarterly, 32-39. Berghel, H. (1998). Digital watermarking makes it mark. netWorker: The craft of network computing, 2(4), 30-39. Collberg, C., & Thomborson, C. (1999, January 20 - 22). Software watermarking: Models and dynamic embeddings. Paper presented at the Proceedings of the 26th ACM SIGPLAN-SIGACT on principles of programming languages, San Antonio, Texas. Cox, I., Miller, M., & Bloom, J. (2000, March 27 -29). Watermarking applications and their properties. Paper presented at the Proceedings of the international conference on information technology: Coding and computing, Las Vegas, Nevada. Dittmann, J., Mukherjee, A., & Steinebach, M. (2000, March 27 - 29). Mediaindependent watermarking classification and the need for combining digital video and audio watermarking for media authentication. Paper presented at the Proceedings of the international conference on information technology: Coding and computing, Las Vegas, Nevada. Dittmann, J., Stabenau, M., & Steinmetz, R. (1998, September 13 - 16). Robust MPEG video watermarking technologies. Paper presented at the Proceedings of the 6th ACM international conference on multimedia, Bristol, United Kingdom. Felke, T. (1999). CIS 119 - Web site development. William Rainey Harper College [1999, November 21]. Gatlin, R., Arn, J., & Kordsmeier, W. (1999, July/August). AACSB deans' understanding of multimedia copyright laws and guidelines. Journal of Education for Business, 74(6), 368-371. Lan, T., & Tewfik, A. (1999, October 30 - November 5). Fraud detection and self embedding. Paper presented at the Proceedings of the seventh ACM international conference (part 2) on multimedia, Orlando, FL. Lynch, P., & Horton, S. (1999). Web style guide. New Haven, Connecticut: Yale University Press. Memon, N., & Wong, P. W. (1998). Protecting digital media content. Communications of the ACM, 41(7), 35-43. Rubin, J. (1994). Handbook of usability testing. New York: John Wiley & Sons, Inc.

31

Samuelson, P. (1999). Good news and bad news on the intellectual property front. Communications of the ACM, 42(3), 19-24. Tannenbaum, R. S. (1998). Theoretical foundations of multimedia. New York, New York: Computer Science Press. Voyatzis, G., & Pitas, I. (1999, January/February). Protecting digital-image copyrights: A framework. IEEE Computer Graphics & Applications, 19(1), 18-24. Wagner, L., & Callihan, S. (1999). Create frontpage 2000 web pages in a weekend. Rocklin, CA: Prima Publishing. Yeung, M., Yeo, B., & Holliman, M. (1998, November/December). Digital watermarks: Shedding light on the invisible. IEEE Micro, 18(6), 32-41. Zemke, R. (1998, June). Wake up! Training, 35(6), 36-42. Zhao, J., Koch, E., & Luo, C. (1998). In business today and tomorrow. Communications of the ACM, 41(7), 67-71.

32

Appendix A Design Phase Usability Questionnaire

33

Digital Watermarking PowerPoint Presentation Design Phase Usability Questionnaire


Name (Optional):________________________ Date:__________________

Please answer the following questions based on the initial design for the Digital Watermarking PowerPoint presentation. After each question, you have the option of adding recommended changes/feedback. Your help in this usability study is greatly appreciated as it will be used for further enhancements in the final presentation design. 1. Does it appear you will be able to navigate through the presentation easily? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 2. Do you like the Pink Panther theme for the presentation? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 3. Does it appear the presentation will have an appropriate amount of information that is conducive to learning about Digital Watermarking? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 4. Do you think the introduction is too long? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 5. Do you like the introduction (it is prior to the Site Map)? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________

34 6. Do you like the background color (i.e. pink/white)? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 7. Does it appear that this presentation will make it enjoyable for you to learn about Digital Watermarking? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 8. Do you think the presentation will allow you to learn at your own pace about Digital Watermarking? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 9. Do you like the graphics/images proposed so far in the presentation? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 10. Do you think this presentation is helpful in learning more about Digital Watermarking? (check one) ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

____ Strongly Disagree

Comments:______________________________________________________________ 11. Do you have any other suggestions for this presentation (i.e. color, graphics, sound files, layout etc)?

Comments:______________________________________________________________

Again, thanks for your effort.

35

Appendix B Final Production Usability Questionnaire

36

Digital Watermarking PowerPoint Presentation Final Production Usability Questionnaire


Name (Optional):________________________ Date:__________________

Please answer the following questions based on the final design for the Digital Watermarking PowerPoint presentation. After each question, you have the option of adding recommended changes/feedback. Your help in this usability study is greatly appreciated, as it will be used for further enhancements to the final presentation. 1. Can you navigate through the presentation easily? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 2. Do you find the presentation an enjoyable learning experience about Digital Watermarking? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 3. Does the presentation have an appropriate amount of information that is conducive to learning about Digital Watermarking? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 4. Do you think the introduction is too long? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 5. Do you like the music in the presentation? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________

37 6. Do you like the background and text colors? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 7. Does the presentation provide a cohesive overview of Digital Watermarking? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 8. Do you think the presentation allows you to learn at your own pace about Digital Watermarking? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 9. Do you like the graphics/images in the presentation? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 10. Do you think this presentation is helpful in learning more about Digital Watermarking? (check one) ____ Strongly Disagree ____ Disagree ____ Neither Agree/Disagree ____ Agree ____ Strongly Agree

Comments:______________________________________________________________ 11. Do you have any other suggestions for this presentation (i.e. color, graphics, sound files, layout etc)? Comments:______________________________________________________________ 12. Do you have any other suggestions for this presentation (i.e. color, graphics, sound files, layout etc)?

Comments:______________________________________________________________ Again, thanks for your effort.

You might also like