Professional Documents
Culture Documents
Watermarking
Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University, Jackson MS 39217 E-mail: natarajan.meghanathan@jsums.edu
A popular application of watermarking is to give proof of ownership of digital data by embedding copyright statements.
For this application, the embedded information should be robust against manipulations that may attempt to remove it.
A practical implication of the robustness requirement is that watermarking methods can typically embed much less information into cover-data than steganographic methods. Desired Characteristics of a Watermarking System: Imperceptibility, Robustness (cannot be modified), Noninvertibility (cannot be removed), Ability to recover with or without the original data
Watermarked Data, I~
Watermark or Confidence measure indicating how likely it is for the given Watermark at the input to be present in the data I~ under inspection
Applications of Watermarking
Copyright protection uses secret key Used to embed information about the source (typically, the copyright owner) of the data in order to prevent other parties from claiming the copyright on the data A data could contain more than one watermarks, indicating copyright info of different sources/owners all such watermarks should be unambiguous. Fingerprinting for traitor tracking uses public/private keys Used to convey information about the legal recipient to identify single distributed copies of the data and trace back illegally produced copies of the data that may circulate. Similar to license numbers assigned to the user of a software product. When the software CD is pirated and used elsewhere, the original user whose CD was used to produce copies would be identified. Copy protection uses public/private keys Multi-media data could be embedded with copy once or copy never watermarks that could be identified by compliant hardware