Professional Documents
Culture Documents
Abstract. The use of digital formatted data offers several advantages over
analog media such as high quality, easy editing, or high fidelity copying. The
development of multimedia services and environments and thus the ease by
which digital media can be duplicated and distributed, requires new concept to
support the protection of the media during the production and the distribution.
In this work I intend to disseminate the general concept of digital
watermarking. I will present the properties of a digital watermark and a
description of methods used to insert watermarks in media. Briefly some
application fields will be exposed and also an overview of methods which can
be used to break digital watermarking protection will be included.
Introduction
Unlike analog media that are becoming obsolete by now, digital media can be
stored, duplicated, and distributed easily and with no lost of fidelity. It is clear that
documents in digital form present a lot of advantages, but they also create problems,
for parties who wish to prevent unauthorized reproduction and distribution of valuable
digital medium (copyrighted, commercial, sensitive, secret documents…).
Encryptions technologies can be used to prevent unauthorized access to the digital
document - protect the content during the transmission of the file, but once it is
received and decrypted, the document is no longer protected and is in clear. As a
complement to encryption and/or copy protection, digital watermarking has been
proposed as “last line of defense” against document misuse.
Digital watermarking describes the process of embedding additional information
into a digital media, without compromising the media’s value. Hiding this piece of
information to anybody besides a special designed detector is achieved by using a
special watermarking technique called steganography. The watermark is then hidden
in such a way that it may be imperceptible to a human observer, but easily detected by
a computer.
The development of watermarking methods involves several design tradeoffs due
to the properties that a digital watermark should fulfill, and depending on the
application field. The requirements and the design constraints will be discussed more
throughout this paper.
2 Aimé Serge Nguimjeu Nguépi
1.1 History
More than 700 years ago, watermarks were used in Italy to indicate the paper brand
and the mill that produced it. By the 18th century watermarks began to be used as
anti-counterfeiting measures on money and other documents. The term watermark
was introduced near the end of the 18th century. It was probably given because the
marks resemble the effects of water on paper. The first example of a technology
similar to digital watermarking is a patent filed in 1954 by Emil Hembrooke for
identifying music works. In 1988, Komatsu and Tominaga appear to be the first to use
the term “digital watermarking”. About 1995, interest in digital watermarking began
to mushroom [21].
1.2 Terminology
Because most of the techniques used to hide or embed data in media share similar
principle and basic ideas, this section will give you some definitions, to avoid
confusion, to clarify and make the difference between these different techniques.
Steganography stands for the art, science, study, work of communicating in a way
which hides a secret message in the main information. Steganography methods rely
generally on the assumption that the existence of the covert data is unknown to
unauthorized parties and are mainly used in secret point-to-point communication
between trusting parties. In general the hidden data does not resist manipulation and
thus cannot be recovered.
Watermarking, as opposed to steganography – in an ideal world can resists to
attacks. Thus, even if the existence of the hidden information is known, it should be
difficult for an attacker to remove the embedded watermark, even if the algorithmic
principle is known.
Data hiding & Data embedding are used in varying context, but they do typically
denote either steganography or applications “between” steganography and
watermarking; applications where the existence of the embedded data are publicly
known, but do not need to be protected.
Copy protection attempts to find ways, which limits the access to copyrighted
material and/or inhibit the copy process itself.
Copyright protection inserts copyright information into the digital object without
the loss of quality. Whenever the copyright of a digital object is in question, this
information is extracted to identify the rightful owner. It is also possible to encode the
identity of the original buyer along with the identity of the copyright holder, which
allows tracing of any unauthorized copies.
Digital Watermarking 3
2.1 Signatures
The watermark identifies the owner of the content. This information can be used by
a potential user to obtain legal rights to copy or publish the document from the contact
owner. It might also be used to help settle ownership disputes [1].
4 Aimé Serge Nguimjeu Nguépi
2.2 Fingerprinting
The figure [23] below illustrates an example with pictures modifications on a given
document. On the left there is the original picture of the car protected using digital
watermark. In the center a modified image obtained by swapping the number 9 and 4
of the license plate. Watermarking technology allows the detection and highlighting
of tampered areas, as shown on the right.
Digital Watermarking 5
Digital watermarks can verify that content is genuine and from an authorized
source, as well as verify that the content has not been altered or falsified. The
presence of the digital watermark and/or the continuity of the watermark can help
ensure that the content has not been altered.
In this case, the watermark must be design in a way that any alteration of the
content lead to the destruction of the watermark or creates a mismatch between the
content and the watermark that can be easily detected. This type of watermark is
sometimes called vapormark.
Watermarking is the process that embeds data called watermark into a media such
that watermark can be detected or extracted later to make an assertion about the
media. For example, a very simple yet widely used digital watermarking technique
would be – for images – to add a visible seal on top of an existing image.
Watermark
information w Encoder
Original
document (audio, Watermark
video, picture…) inserter
So
Watermarked
document Sw
Detected
Watermark Decoder watermark
detector W’
4.2 Robustness
In general a digital watermark must be robust to transformations that include
common signal distortions as well as Digital - Analog/Analog - Digital conversion
8 Aimé Serge Nguimjeu Nguépi
and - as mentioned above – lossy compression, unless the media is altered to the point
of no value
There are two major problems when trying to guaranty robustness; the watermark
must be still present in the media after the transformation or it must be still possible
for the watermark detector to detect it.
When a signal is distorted, its fidelity is only preserved if its perceptually
significant regions remain intact, while perceptually insignificant regions might be
drastically changed with little effect on fidelity. Based on this argumentation, Cox et
al [7, 8] support the fact that the inserting watermark signal in perceptually significant
region of the media is the best way to achieve robustness.
4.3 Fragility
Some application fields require exactly the opposite of robustness. We consider for
example, the use of paper watermarks in bank notes. The point of these watermarks is
that they do not survive any kind of copying, and therefore can be use to indicate the
bill’s authenticity. In some application, the watermark is required to survive certain
transformations and be destroyed by others and that makes the design of fragile
watermarking difficult.
This section presents digital watermarking methods for text images and video.
These medium differ in ways that present unique problems for watermarking. Still the
principle of watermarking remains the same [figure-3].
Image: [5, 6, 7, 20] Watermarks for natural images typically modify pixel
intensities or transform coefficients, although it is conceivable that a watermark could
alter other features such as edges or textures.
An image may be subject to a great deal of manipulation such as filtering,
cropping, geometric transformations, compression and compositing with other images
and hostile attacks. Thus imperceptibility, robustness are usually the most important
properties of image watermarks. Also since many images are compressed (JPEG,
GIF) watermarking algorithms that operate in the transform or wavelet domain may
be useful. One potential difficulty in image watermarking is the finite bandwidth
available. As the image size decreases, the permissible message length decreases.
Audio: There are several ways to embed watermark a music file [4]. The technique
to use depends on different criteria, like imperceptibility, watermark bit rate,
robustness, security, and computational cost. One heavy criterion may for example be
Digital Watermarking 9
the need to keep the watermark even after a certain number of re-encoding or even
digital-analog-digital transfer processes.
Audio watermarking uses the time and frequency masking properties of the human
ear to conceal the watermark, and make it inaudible. One of the techniques is echo-
hiding which involves hiding information within recorded sound by introducing very
short echoes, relying on the fact that the human auditory system cannot perceive
echoes shorter than a few milliseconds. Information is embedded into audio data by
introducing two types of echoes, characterized by their duration and relative
amplitude. This allows us to encode ones and zeros within the audio data.
Digital video is a sequence of still images, and many image watermarking
techniques can be extended to video in a straightforward manner. In contrast to single
images, the large video bandwidth means that long messages can be embedded in
video. Speed is also an important issue because of the huge amounts of data that must
be processed. Digital video is typically stored and distributed in compressed form e.g.
MPEG. Hence, it is often desired that the marked compressed video should not
require more bandwidth than the unmarked compressed video.
Video watermarking poses some unique requirements beyond those for still image
compression because of the additional attacks that video are subject to: frame
shuffling, inter-frame collusion, etc. For instance, it is important not to watermark
each frame of a video as an independent image. If a different watermark is used for
each frame, an attacker can compare frames that change very little within a scene.
Simple collusion between these frames can remove a large part of the watermark.
Also, the computational effort needed to test each frame in real time would be large.
Using the same watermark for each frame also poses problems, since an attacker
could then collude with frames from completely different scenes.
Text Document: Raw texts are indeed very difficult watermark because of the
difficulty to define perceptual headroom in which to embed hidden information. [22]
In his work Helge Hoehn presents a watermarking method for document such as
ASCII text file or computer source code. On the other side final versions of text
documents are typically formatted (PostScript, PDF, and RTF) and it is possible to
hide a watermark in the layout information e.g. word and line spacing and formatting.
Although optical character recognition OCR can theoretically remove any layout
information OCR is expensive imperfect and often requires manual supervision.
Brassil et al [16] have investigated text watermarking and proposed a variety of
methods for embedding hidden messages in PostScript documents.
Attacks on digital watermarking [17] can be classified in two types: those related
to the signal and cryptographic attacks.
Attacks on Signal: The majority of the attacks are related to the watermark signal
itself [13]. They intend to remove the mark, or somehow mask it. These techniques
can rely on the structure of the embedding algorithm to know where and how the
watermark was incrusted. General attacks combine geometrical deformations,
rotation, D/A transformation and lossy compression on the marked signal. The
10 Aimé Serge Nguimjeu Nguépi
Conclusion
In this paper the reader could find some word about the origin of digital
watermarking and an introductory explanation of some of the terms commonly used.
We’ve covered then some application fields of digital watermarking and outlined
several characteristic that digital watermark should fulfill. We also spent some words
about the implementation of digital watermarking technique on specific digital
document. Despite the vulnerability of current techniques, watermarking remains
important as long as it hinders the task of copyright infringement, and current tools
offer this to a limited degree. Digital watermarking is an as yet unproven technology
which, though in its infancy, is set to grow, making a large impact on the way in
which digital media is distributed.
References
[1]S. Craver, N. Memon B.-L. Yeo, and M. Yeung, “Resolving rightful ownerships with
invisible watermarking techniques: Limitations, attacks and implications,” IEEE Trans. on
Selected Areas of Communications, vol. 16, no. 4, pp. 573–586, 1998.
[2]Stephen Wolthusen “On the limitations of digital watermarks”. Fraunhofer-Institute for
Computer Graphics 64283 Darmstadt, Germany.
[3]Gustavus, J. Simmons “The prisoner’s problem and the subliminal channel”. 51-67
[4]R. Walker, “Audio watermarking”. BBC Research & Development, White Paper WHP 057
[5]Raymond B Wolfgang, Christine l. Podilchuk, Edward J. Delp, “Perceptual Watermarks for
Digital Images and Video”.
[6]J.J.K.Ó Ruanaidh, W.J. Dowling G.M. Boland, “Watermarking Digital Images for Copyright
Protection”.
[7]Jonathan K. Su, Frank Hartung, Bernd Girod “Digital Watermarking of Text Image and
Video Document.” Telecommunications Laboratory; Universität of Erlangen-Nuremberg,
Germany
[8]R. G. van Schyndel, A. Z. Tirkel, N. Mee, C. F. Osborne “A Digital Watermark, Processing
of the IEEE International Conference on Image Processing.” November 1994 Austin, Texas,
vol. 2, pp. 86-90.
[9] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “Secure spread spectrum watermarking
for images, audio and video,” in IEEE Int. Conference on Image Processing, vol. 3, pp. 243–
246, 1996.
[10] I. Cox, J. Kilian, F. T. Leighton, and T. Shamoon, “A secure, robust watermark for
multimedia,” in Information Hiding: First Int. Workshop Proc. (R. Anderson, ed.), vol. 1174
of Lecture Notes in Computer Science, pp. 185–206, Springer-Verlag, 1996.
Digital Watermarking 11
[11] E. Koch, J. Rindfrey, and J. Zhao, “Copyright protection for multimedia data,” in Proc. of
the Int. Conf. on Digital Media and Electronic Publishing, 1994.
[12] W. Bender, D. Gruhl, N. Morimoto, and A. Lu, “Techniques for data hiding,” IBM
Systems Journal, vol. 35, no. 3/4, pp. 313–336, 1996.
[13] Fabien A. P. Petitcolas, Ross J. Anderson and Markus G. Kuhn “Information hiding-a
survey. Proceedings of the IEEE”, July 1999 Special Issue "Identification and protection of
multimedia information".
[14] Fabien A. P. Petitcolas, Ross J. Anderson, and Markus G. Kuhn. Attacks on copyright
marking systems. In Second workshop on information hiding, pages 218-238, 1998.
[15] Jana Dittmann, Andreas Lang and Martin Steinebach, „StirMark Benchmark - Audio
Watermarking Attacks Based on Lossy Compression “.Fraunhofer Institute IPSI, Darmstadt,
Germany
[16] Brassil, J. Low, S. Maxemchu, N., and O’Gorman, L., “Electronic marking and
identification techniques to discourage document copying”. Proceedings of IEEE
INFOCOM’94, 1994 3, pp.1278-1287
[17]Fabien A. P. Petitcolas “Attaques et evaluation des filigranes numérique” University of
Cambridge, Computer Laboratory.
[18]Matt L. Miller, Ingemar J. Cox, Jean-Paul M.G. Linnartz, Ton Kalker, „A review of
watermarking principles“. Published in “Digital Signal Processing in Multimedia Systems”,
Ed. K. K. Parhi and T. Nishitani, Marcell Dekker Inc., 461-485, (1999)
[19] www.digimarc.com
[20] Fraunhofer Watermarking Portal: http://watermarkingportal.ipsi.fraunhofer.de/
[21] Frank Hartung, Martin Kutter, “Multimedia Watermarking Techniques”,
Proceedings of the IEEE, Vol. 87, No. 7, pp. 1085 – 1103, July 1999.
[22] Helge Hoehn, Natural Language Watermarking, Seminar Series Selected Topics
of IT Security, summer term 2007, Faculty of Security in Information Technology,
Technical University of Darmstadt
[23] Dr. Martin Kutter, Dr. Frédéric Jordan, Digital Watermarking Technology,
www.alpvision.com