Digital Watermarking
Digital Watermarking
Digital Watermarking
INTRODUCTION
DIGITAL WATERMARKING is the process of embedding information into a
digital signal which may be used to verify its authenticity or the identity of its owners, in
the same manner as paper bearing awatermark for visible identification. In digital
watermarking, the signal may be audio, pictures, or video. If the signal is copied, then the
information also is carried in the copy. A signal may carry several different watermarks at
the same time.
While some file formats for digital media may contain additional information
called metadata, digital watermarking is distinctive in that the data is carried right in the
signal.
CATEGORIES
(i)visible watermark,
1.static watermarking
2.dynamic watermarking
APPLICATIONS
Digital watermarking may be used for a wide range of applications, such as:
Copyright protection
Source tracking (different recipients get differently watermarked content)
Broadcast monitoring (television news often contains watermarked video from
international agencies)
Covert communication
Classification
A digital watermark is called robust with respect to transformations if the
embedded information may be detected reliably from the marked signal, even if
degraded by any number of transformations. Typical image degradations are JPEG
compression, rotation, cropping, additive noise, and quantization. For video content,
temporal modifications and MPEG compression often are added to this list. A digital
watermark is called imperceptible if the watermarked content is perceptually
equivalent to the original, unwatermarked content. In general, it is easy to create
robust watermarks—or—imperceptible watermarks, but the creation of robust—and
—imperceptible watermarks has proven to be quite challenging.Robust imperceptible
watermarks have been proposed as tool for the protection of digital content, for
example as an embeddedno-copy-allowed flag in professional video content.
Robustness
A digital watermark is called fragile if it fails to be detectable after the slightest
modification. Fragile watermarks are commonly used for tamper detection (integrity
proof). Modifications to an original work that clearly are noticeable, commonly are not
referred to as watermarks, but as generalized barcodes.
Perceptibility
A digital watermark is called imperceptible if the original cover signal and the marked
signal are (close to) perceptually indistinguishable.
Capacity
The length of the embedded message determines two different main classes of
digital watermarking schemes:
The message is conceptually zero-bit long and the system is designed in
order to detect the presence or the absence of the watermark in the marked
object. This kind of watermarking scheme is usually referred to as zero-
bit or presence watermarking schemes. Sometimes, this type of watermarking
scheme is called 1-bit watermark, because a 1 denotes the presence (and a 0
the absence) of a watermark.
The message is a n-bit-long stream ( , with n =
| m | ) or M = {0,1} and is modulated in the watermark. These kinds of schemes
n
Embedding method
A digital watermarking method is referred to as spread-spectrum if the marked signal
is obtained by an additive modification. Spread-spectrum watermarks are known to
be modestly robust, but also to have a low information capacity due to
host interference.
Cameras
Epson and Kodak have produced cameras with security features such as the Epson
PhotoPC 3000Z and the Kodak DC-290. Both cameras added irremovable features
to the pictures which distorted the original image, making them unacceptable for
some applications such asforensic evidence in court. According to Blythe and
Fridrich, "[n]either camera can provide an undisputable proof of the image origin or
its author".
A secure digital camera (SDC) was proposed by Mohanty, et al. in 2003 and
published in January 2004. This was not the first time this was proposed.Blythe and
Fridrich also have worked on SDC in 2004[4] for a digital camera that would use
lossless watermarking to embed abiometric identifier together with a cryptographic
hash.