A Partial Survey of the Perfect Digital Watermark Problem.

Slides:



Advertisements
Similar presentations
Spatial Domain Image Watermarking Robust against Compression, Filtering, Cropping and Scaling By Sebé, Domingo-Ferrer, Herrera Information Security Dec.
Advertisements

Prepared for DA 201  Introduction to Digital Watermarking.
Introduction to Watermarking Anna Ukovich Image Processing Laboratory (IPL)
Information Hiding: Watermarking and Steganography
Brodatz Textures Vistex Textures What is texture ? Texture can be considered to be repeating patterns of local variation of pixel intensities.
LOGO Digital watermarking Soher almursheidi University of Palestine College of Information Technology Management Information Systems 3. May.
A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Technical Aspects of Digital Rights Management
N-Secure Fingerprinting for Copyright Protection of Multimedia
Digital Watermarking for Multimedia Security R. Chandramouli MSyNC:Multimedia Systems, Networking, and Communications Lab Stevens Institute of Technology.
Copyright Infringement
Fifth International Conference on Information
Watermarking Technology Ishani Vyas CS590 Winter 2008.
Security 3 Distributed Systems Lecture # 16. Overview Steganography Digital Watermarking.
In the last part of the course we make a review of selected technical problems in multimedia signal processing First problem: CONTENT SECURITY AND WATERMARKING.
Secure Spread Spectrum Watermarking for Multimedia Ishani Vyas CS590 Winter 2008.
A Novel Scheme for Hybrid Digital Video Watermarking By Pat P. W. Chan Supervised by Michael R. Lyu 2/2/2004 Computer Science and Engineering Department.
Digital Watermarking. Introduction Relation to Cryptography –Cryptography is Reversibility (no evidence) Established –Watermarking (1990s) Non-reversible.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Multimedia Security Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Nov 20, 2002 Department of Computer.
Game March 22, 2005Ashley Irvin/ Copyright Copyright and Plagiarism for Students Exploring the world of copyright and plagiarism.
Robust Digital Right Management Scheme (DRM) for Multimedia Anuj Maheshwari Victor Sutan
 area of law that deals with protecting the rights of those who create original works  Also called as confidential information.  It is called “intellectual”
Copy Protection for DVD Video Aline Martin ECE 738 Project – Spring 2005 J.Bloom, I.Cox,T.Kalker,J.P.Linnartz,M.Miller, and C.B.S.Traw.
Digital Image Watermarking Er-Hsien Fu EE381K Student Presentation.
Digital Watermarking Parag Agarwal
Adam Day.  Applications  Classification  Common watermarking methods  Types of verification/detection  Implementing watermarking using wavelets.
NYMAN 2004, New York City 1 E. Ganic & Ahmet M. Eskicioglu A DFT-BASED SEMI-BLIND MULTIPLE WATERMARKING SCHEME FOR IMAGES Emir Ganic and Ahmet M. Eskicioglu.
Watermarking University of Palestine Eng. Wisam Zaqoot May 2010.
By : Vladimir Novikov. Digital Watermarking? Allows users to embed SPECIAL PATTERN or SOME DATA into digital contents without changing its perceptual.
Digital Steganography
Thái Chí Minh Trần Lương Khiêm 1. Content  Introduction  History  Applications  Requirements  Techniques  Attacks 2.
Level 2 IT Users Qualification – Unit 1 Improving Productivity Chris.
Digital Watermarking Simg-786 Advanced Digital Image Processing Team 1.
Digital Watermarking Sapinkumar Amin Guided By: Richard Sinn.
Digital Watermarking -Interim Report (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Yarmouk university Hijjawi faculty for engineering technology Computer engineering department Primary Graduation project Document security using watermarking.
Digital image processing is the use of computer algorithms to perform image processing on digital images which is a subfield of digital signal processing.
Russell Taylor. How the law supports Copyright Copyright Designs and Patents Act 1988 Copyright arises when an individual or organisation creates a work,
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Level 2 IT Users Qualification – Unit 1 Improving Productivity JACK GOODING.
STEGANOGRAPHY AND DIGITAL WATERMARKING KAKATIYA INSTITUTE OF TECHNOLOGY AND SCIENCES,WARANGAL.
Digital Watermarking -Project Proposal (EE5359: Multimedia processing) Under the Guidance of Dr. K. R. Rao Submitted by: Ehsan Syed
Audio Watermarking Techniques Single Member - Arun Kancharla (CVN) E6886 Spring 2005.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Secure Spread Spectrum Watermarking for Multimedia Young K Hwang.
PRESENTED BY, C.RESHMA –II CSE S.POORNIMA –II IT.
Cryptographic Anonymity Project Alan Le
Multimedia Security. “Everything” is digital these days - a copy of a digital media element is identical to the original. How can an owner protect their.
Digital Watermarking Multimedia Security. 2 What is the Watermark ? Paper Watermark –the technique of impressing into the paper a form, image, or text.
Image Processing: Embedding Data in Digital Images Sami Khorbotly & Firas Hasan Dept. of Elec. & Comp. Eng. & Comp. Sc. Ohio Northern University.
By: U.Aruna M.Shanthi Priya Allows users to embed special pattern or some data into digital contents without changing its perceptual quality. When data.
IMAGE AUTHENTICATION TECHNIQUES Based on Automatic video surveillance (AVS) systems Guided by: K ASTURI MISHRA PRESENTED BY: MUKESH KUMAR THAKUR REG NO:
[1] National Institute of Science & Technology Technical Seminar Presentation 2004 Suresh Chandra Martha National Institute of Science & Technology Audio.
1 Digital Water Marks. 2 History The Italians where the 1 st to use watermarks in the manufacture of paper in the 1270's. A watermark was used in banknote.
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Technical Aspects of Digital Rights Management
STEGANOGRAPHY.
DONE BY S.MURALIRAJAN M.NIRMAL
Security Issues for Visual Data: Copyright and Access Control
A User Attention Based Visible Watermarking Scheme
Parag Agarwal Digital Watermarking Parag Agarwal
Fun Stuff: Digital Media
Authors: J.J. Murillo-Fuentes
Digital Watermarking Lecture 2
Presentation transcript:

A Partial Survey of the Perfect Digital Watermark Problem

Digital Watermark Definition: A piece of digital information (visible or invisible) that is intended to “mark” a piece of digital media. Purpose: To allow a respective owner can keep track of their media and also secure against certain people that wish to redistribute the media illegally.

Security Prevent theft Protect individual or company assets Ownership Illegal Distribution Solid, proper claims to media Advancements in Mathematics and Computer Science Pushes advances in data compression and error detection Pushes a collaboration in Mathematical fields Hybrid field that has a lot of great opportunities to further our knowledge

The Golden Crown of Digital Watermarks Has become immune to all form of “attacks” RST, Protocol attacks, etc. If somehow compromised, it will destroy the media Well, what does it look like? No idea

General Encryption SchemeGeneral Decryption Scheme

No one knows for sure Lots of theories and ideas about how to build the best and most robust watermark, but no way to tell which one may lead to a perfect watermark. No coherent line of work to follow

The greatest threat/challenge to a perfect digital watermark is data compression Watermark => Redundant data added to media Compression => Removal of all redundant data Therefore, the perfect digital watermark must withstand compression Remains unsolved

Visible This type of watermark is visible on the media. Has varying degrees to which it can be visible Most commonly used form of watermarking Cheap and very easy to do as an individual This type of watermark is completely impossible to see on the media. Cannot be seen with the naked-eye. Digital Code – To – Digital Code Common, but more difficult to implement on the individual level. Invisible

Pros: Obvious ownership claim Can be blended into the image to make it harder to notice Can be made to fill the image making it challenging to remove Is obviously present and can be removed with limited skill Can be cropped out Doesn’t destroy media when removed Can be copied Cons:

Pros: Have to know it’s there to attack it Requires more technical skill on the part of the attacker to remove Protects all the media, not just a small portion Allows the option for media to be destroyed Takes more advanced skill to implement (especially the more robust the watermark) Can have protocol weaknesses Can be copied Cons:

All schemes follow very closely from digital images Videos Have audio and visual component to protect Visual schemes leave audio completely vulnerable Invisible schemes protect entire media Have temporal (time) component Watermarks must last the entire time length of a video Allows new options Moving watermarks Have three classifications Key: The key used in the watermarking scheme Carrier: When the watermark is embedded (Original, encoder, compression) Domain: The area where the watermark is embedded (pixel or transform)

Audio Has no visual component Thus invisible watermarking is the only option Nearly all schemes are identical to the ones used for images Invisible watermark => Data – to – Data Doesn’t care what the data is about (all 1’s and 0’s) Compression is a beast Audio watermarks suffer (like all other forms) in the battle with compression. Several different compression algorithms for audio Some more obscure and foreign

Not truly perfect Nothing has become invincible (i.e. immune to all attacks). Play the Game Make it so time consuming and agonizing to remove that an attacker gives up or doesn’t even attempt.

It’s hard to tell if a “perfect” digital watermark will be invented/created. A lot of theory and work is being done in several different directions The battle between watermarking and compression makes it hard for a “perfect” scheme to exist Watermarks are important

Copyright Law If a perfect watermark was created/invented, it wouldn’t be available to the mass public Individuals would most likely not have the ability or technical skills to use this type of security. Thus, copyright law would remain as ambiguous as it is today.

So a perfect digital watermark would not affect copyright law on the individual level On the corporate level it would allow the absolute protection of a media from illegal distributers and would resolve all ownership issues (bye bye Megaupload) However, if perfect was available to everyone, what would happen? Hosting sites wouldn’t be able to host media Would become much harder to share media on the massive scale that the internet provides today “No such thing as bad publicity”

The Perfect Digital Watermark Remains Unsolved Too many different theories being worked on Compression is a beast May prove more harmful than helpful The work being done on watermarks is vast and varying Using math theories ranging from Information and Code Theory to Game Theory and Geometry Everything is being explored and used Lots of work remains to be explored

1.) deviantArt. (2013). Copyright Policy. Retrieved from ) Youtube. (2013). What is Copyright? Retrieved from ) Patel, S., Katharotiya, A., & Goyani, M. (2011). A Survey on Digital Video Watermarking. Int. J. Comp. Tech. Appl., Vol 2 (6). Retrieved from ) Hartung, F., & Kutter, M. (1999). Multimedia Watermarking Techniques. Proceedings of the IEEE, 87. Retrieved from All digital watermarking example images and watermark are copyright to Christopher Thompson. All copyright law images are copyright to their respective owners (i.e. deviantArt and Youtube)