Presentation is loading. Please wait.

Presentation is loading. Please wait.

The First 50 Years of Electronic Watermarking Ingemar J. Cox, Matt L. Miller NEC Research Institute Journal of Applied Signal Processing, 2002, 2, 126-132.

Similar presentations


Presentation on theme: "The First 50 Years of Electronic Watermarking Ingemar J. Cox, Matt L. Miller NEC Research Institute Journal of Applied Signal Processing, 2002, 2, 126-132."— Presentation transcript:

1 The First 50 Years of Electronic Watermarking Ingemar J. Cox, Matt L. Miller NEC Research Institute Journal of Applied Signal Processing, 2002, 2, 126-132

2 Outline Is the interest warranted? Is the interest warranted? What are the existing and potential commercial applications of this technology? What are the existing and potential commercial applications of this technology? What scientific progress has been made in the past 10 years? What scientific progress has been made in the past 10 years? What are the most exciting areas for research? What are the most exciting areas for research? Where might the next 10 years take us? Where might the next 10 years take us?

3 Dawn of Adventure In 1954, The Muzak Corporation filed a patent for “ watermarking ” musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centered at 1KHz. In 1954, The Muzak Corporation filed a patent for “ watermarking ” musical Work. An identification Work was inserted in music by intermittently applying a narrow notch filter centered at 1KHz. Electronic watermarking had been invented! Electronic watermarking had been invented! Interests in embedded signaling continued throughout the next 35 years. Interests in embedded signaling continued throughout the next 35 years. About 1995, interest in digital watermarking began to mushroom. Numbers of related journal papers grows exponentially. About 1995, interest in digital watermarking began to mushroom. Numbers of related journal papers grows exponentially.

4 Why did Watermarking Research Increase? The sudden increase in watermarking interest is most likely due to the increase in concern over copyright protection of content The sudden increase in watermarking interest is most likely due to the increase in concern over copyright protection of content copyright-protected digital contents are easily recorded and distributed due to: copyright-protected digital contents are easily recorded and distributed due to: prevalence of high-capacity digital recording devices the explosive growth in using Internet

5 Watermarking techniques in current standards The CPTWG (Copy Protection Technical Working Group) tested watermarking systems for protection of video on DVD disks. The CPTWG (Copy Protection Technical Working Group) tested watermarking systems for protection of video on DVD disks. The SDMI (Secure Digital Music Initiative) made watermarking a core component in their system for music protection. The SDMI (Secure Digital Music Initiative) made watermarking a core component in their system for music protection. Two projects sponsored by the European Union, VIVA and Talisman, tested watermarking for broadcast monitoring. Two projects sponsored by the European Union, VIVA and Talisman, tested watermarking for broadcast monitoring. The ISO (International Organization for Standardization) took an interest in the context of designing advanced MPEG standards. (MPEG-21) The ISO (International Organization for Standardization) took an interest in the context of designing advanced MPEG standards. (MPEG-21)

6 Watermarking v.s. cryptography Cryptography is the most common method of protecting digital content and is one of the best developed science. Cryptography is the most common method of protecting digital content and is one of the best developed science. However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption. However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption. Digital watermarking can protect content even after it is decrypted. Digital watermarking can protect content even after it is decrypted. Encryption Decryption ? Under Protection

7 The Problems Watermarking Techniques Faced Initial expectations of watermarking are too high Initial expectations of watermarking are too high Security against intentional efforts to remove a watermark from content Security against intentional efforts to remove a watermark from content Request for proposal met specifications Request for proposal met specifications Slow adoption of watermarking techniques Slow adoption of watermarking techniques Mainly due to the diverge business interests of the three industry groups Mainly due to the diverge business interests of the three industry groups Content owner Content owner Manufacturers of consumer electronics Manufacturers of consumer electronics Manufactures of computers Manufactures of computers Is the current business and academic interest in watermarking warranted? Is the current business and academic interest in watermarking warranted?

8 The Business Perspective Can watermarking provide economic solutions to real problems? Can watermarking provide economic solutions to real problems? Current business interests Current business interests Security Security Current watermark solutions are of weak sucurity, but suitable for many business models Current watermark solutions are of weak sucurity, but suitable for many business models Device control Device control No security threat or requirements No security threat or requirements Linking traditional media to the Web is receiving increased attention. Linking traditional media to the Web is receiving increased attention.

9 Early Uses of Watermarking Watermarks has been deployed for some applications for several decades Watermarks has been deployed for some applications for several decades Owner identifications Owner identifications Muzak Corporation Muzak Corporation DiVX DVD Player from DiVX Corporation DiVX DVD Player from DiVX Corporation Advertising monitoring Advertising monitoring Nielsen Media Research Nielsen Media Research Competitive Media Reporting Competitive Media Reporting Verance Corporation Verance Corporation Device control Device control 1962, Lynch Carrier Systems Inc., Noller, telephony control system 1962, Lynch Carrier Systems Inc., Noller, telephony control system Mulsicast Inc., broadcast advertisement avoiding systems Mulsicast Inc., broadcast advertisement avoiding systems 1981, Dolby Labs, visual display and decoding control system 1981, Dolby Labs, visual display and decoding control system 1989, Interactive Systems Inc., video broadcasting of commands to interactive devices 1989, Interactive Systems Inc., video broadcasting of commands to interactive devices

10 Potential Applications Transaction tracking Transaction tracking Proof of ownership Proof of ownership Copy control Copy control Authentication Authentication Legacy system enhancement Legacy system enhancement Database Linking Database Linking

11 Transaction Tracking Also named fingerprinting Also named fingerprinting The watermark identifies the legal recipient of he copy, and can be used to trace the source of illegally redistributed content. The watermark identifies the legal recipient of he copy, and can be used to trace the source of illegally redistributed content. Large scale use for transaction tracking is vulnerable for collusion attacks, but it is still worthwhile to catch adversaries who lacked the diligence or knowledge to perform these attacks. Large scale use for transaction tracking is vulnerable for collusion attacks, but it is still worthwhile to catch adversaries who lacked the diligence or knowledge to perform these attacks. Example: the defunct DiVX player Example: the defunct DiVX player The DIVX Corporation sold a enhanced DVD player that implements a pay- per-view model. The DIVX Corporation sold a enhanced DVD player that implements a pay- per-view model. Each player will place a unique watermark in the video disk it played. Each player will place a unique watermark in the video disk it played. Once the video disk is recorded and sold, the adversary can be tracked! Once the video disk is recorded and sold, the adversary can be tracked! Small-scale transaction tracking where collusion attacks is impossible can be implemented with high security Small-scale transaction tracking where collusion attacks is impossible can be implemented with high security Example: distributing the dailies to some VIPs in Hollywood Example: distributing the dailies to some VIPs in Hollywood

12 Proof of Ownership The most ambitious form of this application is to prove ownership in a court of law. The most ambitious form of this application is to prove ownership in a court of law. 1996, Craver et. al. “ Can invisible watermarks solve rightful ownerships? ” points out the counterfeit attacks and a cryptographic solution. 1996, Craver et. al. “ Can invisible watermarks solve rightful ownerships? ” points out the counterfeit attacks and a cryptographic solution. With properly designs, it is technically possible to prove ownerships with watermarks. With properly designs, it is technically possible to prove ownerships with watermarks. Business and legal issues are the only hurdles to adoption of such a technology. Business and legal issues are the only hurdles to adoption of such a technology.

13 Copy Control If every recording device contained with a watermark decoder, we can use watermarks to prevent copying of copyrighted material. If every recording device contained with a watermark decoder, we can use watermarks to prevent copying of copyrighted material. Two difficult to implement watermarking-based copy control systems Two difficult to implement watermarking-based copy control systems Technical Technical The weak security is worthwhile The weak security is worthwhile Political Political It is hard to persuading manufacturers to include watermark decoders in decoding devices It is hard to persuading manufacturers to include watermark decoders in decoding devices Adding cost Adding cost Reduce the value Reduce the value Solution Solution Combines law and contractual obligations Combines law and contractual obligations

14 Keep honest people honest Compliant player Non-Compliant player Legal, encrypted copy Illegal, decrypted copy Compliant recorder Playback control by encryption Copy control by watermarking

15 Legacy System Enhancement and Database Linking Schreiber et. Al., ” a compatible high-definition television system using the noise0margin method of hiding enhancement information ” Schreiber et. Al., ” a compatible high-definition television system using the noise0margin method of hiding enhancement information ” Database linking Database linking Digimark, the MediaBridge Digimark, the MediaBridge Philips, using PDA to identify the song from received hidden audio signals, and linked to the related website Philips, using PDA to identify the song from received hidden audio signals, and linked to the related website Microsoft Microsoft New companies promote watermarking as their core competence New companies promote watermarking as their core competence

16 The Academic Perspective Is watermarking introduces new and interesting problems for basic and applied research? Is watermarking introduces new and interesting problems for basic and applied research? Watermarking is a interdisciplinary study Watermarking is a interdisciplinary study Communication Communication Cryptography Cryptography Media processing, e.g. image, audio, video Media processing, e.g. image, audio, video Due to the difficult and conflicting requirements of watermarking, new problems has been posed in each fields, and commercial implementations must meet both economic and engineering constraints Due to the difficult and conflicting requirements of watermarking, new problems has been posed in each fields, and commercial implementations must meet both economic and engineering constraints Robustness Robustness Fidelity Fidelity Rate Rate

17 Basic Research (I) Early works are essentially heuristic. Early works are essentially heuristic. A more rigorous understanding of watermarking is developed, beginning in the mid-1990 A more rigorous understanding of watermarking is developed, beginning in the mid-1990 The most significant progress is in the development of increasingly sophisticated models of watermarking. The most significant progress is in the development of increasingly sophisticated models of watermarking. Model watermarking as a communications channel. Model watermarking as a communications channel. The original and the subsequent distortions are modeled as noises The original and the subsequent distortions are modeled as noises The imperceptibility constraints are modeled as a power constraint in the embedder The imperceptibility constraints are modeled as a power constraint in the embedder In 1999, watermarking can be more accurately modeled as communication channels with side informations In 1999, watermarking can be more accurately modeled as communication channels with side informations Costa, “ Writing on dirty papers ” Costa, “ Writing on dirty papers ” In 1995, it is recognized that the fidelity constraint required a perceptual model, and various perceptual models are adopted. In 1995, it is recognized that the fidelity constraint required a perceptual model, and various perceptual models are adopted.

18 Basic Research (II) In the last 10 years, significant progress are made in the development of attacks and counter attacks. In the last 10 years, significant progress are made in the development of attacks and counter attacks. Spread-spectrum communications are introduced at the same time as the adoption of perceptual models Spread-spectrum communications are introduced at the same time as the adoption of perceptual models Around 1998, more rigorous quantitative measures was introduced based on traditional false-alarm and bit-error-rate techniques. Around 1998, more rigorous quantitative measures was introduced based on traditional false-alarm and bit-error-rate techniques. More accurate noises are adopted, especially the quantization noises. More accurate noises are adopted, especially the quantization noises.

19 Applied Research Engineering progress focus on meeting fidelity, robustness, and economic constraints. Engineering progress focus on meeting fidelity, robustness, and economic constraints. Steady progress has been made to the problem of geometric and temporal distortion. Steady progress has been made to the problem of geometric and temporal distortion. Exhaustive search Exhaustive search Explicit and implicit synchronization/registration Explicit and implicit synchronization/registration Autocorrelation Autocorrelation Invariants Invariants Significant experiments with a variety of different marking spaces Significant experiments with a variety of different marking spaces Frequency domain Frequency domain Compressed domain, e.g. MPEG/JPEG Compressed domain, e.g. MPEG/JPEG Suitable for large-scale deployment such as DVD Suitable for large-scale deployment such as DVD

20 What is in the Future? Some advances are in their infancy, and much work remains to be done. Some advances are in their infancy, and much work remains to be done. Some results are imminent, making an area exciting. While in other cases, no breakthroughs are found on the horizon. Some results are imminent, making an area exciting. While in other cases, no breakthroughs are found on the horizon. Possible research topics Possible research topics Informed embedding Informed embedding Geometric/temporal distortions in a blind detector Geometric/temporal distortions in a blind detector Optimally embedding with fidelity and robustness constraints Optimally embedding with fidelity and robustness constraints Whether a watermarking system can be designed that permits public detection while preventing an adversary form removing the watermark. (The authors are divided in this problem) Whether a watermarking system can be designed that permits public detection while preventing an adversary form removing the watermark. (The authors are divided in this problem)

21 Conclusions The interests in watermarking is appropriate. The interests in watermarking is appropriate. The copyright applications will be overshadowed by other applications such as broadcast monitoring, authentication, and transaction tracking. The copyright applications will be overshadowed by other applications such as broadcast monitoring, authentication, and transaction tracking. Various applications are emerging Various applications are emerging Considerable progress has been made Considerable progress has been made Conceptual and perceptual models Conceptual and perceptual models Attacks and countermeasures Attacks and countermeasures Tricks for efficient implementations Tricks for efficient implementations


Download ppt "The First 50 Years of Electronic Watermarking Ingemar J. Cox, Matt L. Miller NEC Research Institute Journal of Applied Signal Processing, 2002, 2, 126-132."

Similar presentations


Ads by Google