Professional Documents
Culture Documents
422 Digital Watermarking For Information Security
422 Digital Watermarking For Information Security
Outline
Introduction, Applications Characteristics and classification Popular techniques for watermarking
Definition: A digital watermark is a digital signal or pattern inserted into a digital document such as text, graphics or multimedia, and carries information unique to the copyright owner, the creator of the document or the authorized consumer.
Example
Watermarking Vs Encryption
Encryption involves document transformation
so that the contents of the document are not visible without a decryption key Watermarking leaves the original file/image intact and recognizable
the document A makes the watermarked image publicly available B claims that he owns the image derived from the public image A produces the unmarked original and establishes the presence of As watermark
Fingerprinting
Used to avoid unauthorized duplication and distribution. A distinct watermark (a fingerprint) is embedded in each copy of
the data. If unauthorized copies are found, the origin of the copy can be determined by retrieving the fingerprint.
authority should easily detect it. Unambiguous: retrieval of it should unambiguously identify the data owner.
like to destroy it in order to counterfeit the copyright of the data. Moreover, removal of it should cause a considerable degradation in the quality of the data. Visible watermarks should be visible enough to discourage theft.
11
14
15
Easily defeated
Retyping the text destroys the watermark Word processors change the spacing
between words and lines Character encoding can be defeated by changing the font
16
the pixels in the lower bit plane; e.g., Change some of the bits from 1 to 0 or 0 to 1.
Frequency Domain Watermarking: First convert the
image to the frequency domain and then apply the watermark in the low frequency regions.
17
each pixel. Eight 7-bit segments (from eight different pixels) are concatenated and the final checksum is thus 56-bit. Locations of the pixels that are to contain one bit each of the checksum are randomly chosen. These pixel locations along with the checksum form the watermark, W. Last bit of each pixel is then changed to the corresponding checksum bit.
18
19
Bavarian couple
Original
Watermarked Version
20
Advantages/Disadvantag es
Embedding the checksum only changes (on average) half
the number of pixel. So less visual distortion. Can hold multiple watermarks as long as they dont overlap. Extremely simple and fast. Extremely fragile. Any change to the checksum causes the failure of the verification procedure. Forger could replace a section with another one of equal size and checksum. Entire watermark can be removed by removing the LSB plane. Cant survive lossy compression.
21
Conclusion
First generation of copyright marking
schemes is not strong enough Existing schemes provide only limited measures of marking Can only meet few requirements at a time
Tradeoff - Bandwidth vs. robustness No single problem but a constellation!
22
Q&A
23