Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
In recent years, the distribution of works of art, including pictures, music, video and textual documents, has become easier. With the widespread and increasing use of the Internet, digital forms of these media (still images, audio, video, text) are easily accessible. This is clearly advantageous, in that it is easier to market and sell one's works of art. However, this same property threatens copyright protection. Digital documents are easy to copy and distribute, allowing for pirating. There are a number of methods for protecting ownership. One of these is known as digital watermarking. Digital watermarking is the process of inserting a digital signal or pattern (indicative of the owner of the content) into digital content. The signal, known as a watermark, can be used later to identify the owner of the work, to authenticate the content, and to trace illegal copies of the work. Watermarks of varying degrees of obtrusiveness are added to presentation media as a guarantee of authenticity, quality, ownership, and source. To be effective in its purpose, a watermark should adhere to a few requirements. In particular, it should be robust, and transparent. Robustness requires that it be able to survive any alterations or distortions that the watermarked content may undergo, including intentional attacks to remove the watermark, and common signal processing alterations used to make the data more efficient to store and transmit. This is so that afterwards, the owner can still be identified. Transparency requires a watermark to be imperceptible so that it does not affect the quality of the content, and makes detection, and therefore removal, by pirates less possible. Or digital watermarking is the process of embedding information into a digital signal in a way that is difficult to remove. The signal may be audio, pictures or video. If the signal is copied, then the information is also carried in the copy. A signal may carry several different watermarks at the same time. 1
More information is transmitted in a digital format now than ever, and the growth in this trend will not plateau in the foreseeable future. Digital information is susceptible to having copies made at the same quality as the original. There are many types of digital information and data. The types are Digital Images Digital Audio, and Digital Videos
A watermark is a pattern of bits inserted into a digital image, audio or video file that identifies the file's copyright information (author, rights, etc.). The name watermark is derived from the faintly visible marks imprinted on organizational stationery. Unlike printed watermarks, which are intended to be somewhat visible (like the very light compass stamp watermarking this report), digital watermarks are designed to be completely invisible, or in the case of audio clips, inaudible. In addition, the bits representing the watermark must be scattered throughout the file in such a way that they cannot be identified and manipulated. And finally, a digital watermark must be robust enough to survive changes to the file its embedded in, such as being saved using a lossy compression algorithm eg: JPEG. Satisfying all these requirements is no easy feat, but there are a number of companies offering competing technologies. All of them work by making the watermark appear as noise that is, random data that exists in most digital files anyway. Digital Watermarking works by concealing information within digital data, such that it cannot be detected without special software with the purpose of making sure the concealed data is present in all copies of the data that are made whether legally or otherwise, regardless of attempts to damage/remove it. This need for methods and tools to protect ones intellectual property rights initiated the relatively new research field of digital watermarks. Someone familiar with encryption techniques might be tempted to ask why there is such 2
an amount of interest in the research community to develop robust watermarking techniques, if numerous secure encryption algorithms are readily available. There are several reasons for this: Encryption alone often is insufficient to protect digital content, since unconsidered and erroneous usage by human operators often renders it useless. If somebody breaks the encryption (e.g. breaking the content scrambling system used on DVDs with tools like DeCSS, VobDec or SmartRipper), copyright infringements can still be proven using the embedded watermark. The decryption process usually depends on the data being unmodified. Since rightful owners are to be allowed to access the data they paid for, the encryption needs to be undone at some point. As the unencrypted data is normally being held in the main memory of computers, its not too difficult to devise tools for storing it onto a local hard disk (e.g. many DVD players for the Windows OS use DirectShow for video output. This proves to be useful for multiangle DVDs, where applications like DeCSS fail. By using tools that implement appropriate DirectShow filters to write the decoded images to a user-specified file instead of displaying them on the screen (e.g. DVDRip), the raw video data is still accessible. Because of these shortcomings, digital watermarking is sometimes referred to as being the last line of defence. Consequently, an effective watermark should normally have several properties, whose importance will vary depending upon the application. There are a variety of image watermarking techniques, falling into 2 main categories, depending on in which domain the watermark is constructed: the spatial domain (producing spatial watermarks) and the frequency domain (producing spectral watermarks). The effectiveness of a watermark is improved when the technique exploits known properties of the human visual system. These are known as perceptually based watermarking techniques. Within this category, the class of image-adaptive watermarks proves most effective. 3
In conclusion, image watermarking techniques that take advantage of properties of the human visual system, and the characteristics of the image create the most robust and transparent watermarks.
History
The term "digital watermark" was first coined in 1992 by Andrew Tirkel and Charles Osborne. Actually, the term used by Tirkel and Osborne was originally used in Japan-from the Japanese-- "denshi sukashi" -- literally, an "electronic watermark
prevent this, currencies and stock certificates contain watermarks. These watermarks are one of the methods for preventing counterfeit and illegal use. Digital watermarks apply a similar method to digital content. Watermarked content can prove its origin, thereby protecting copyright. A watermark also discourages piracy by silently and psychologically deterring criminals from making illegal copies.
Fig 1.1 structure of watermark The material that contains a digital watermark is called a carrier. A digital watermark is not provided as a separate file or a link. It is information that is directly embedded in the carrier file. Therefore, simply viewing the carrier image containing it cannot identify the digital watermark. Special software is needed to embed and detect such digital watermarks. Kowa 's SteganoSign is one of these software packages. Both images and audio data can carry watermarks. A digital watermark can be detected as shown in the following illustration.
Another scenario in which the enforcement of copyright is needed is in newsgathering. When digital cameras are used to snapshot an event, the images must be watermarked as they are captured. This is so that later, image's origin and content can be verified. This suggests that there are many applications that could require image watermarking, including Internet imaging, digital libraries, digital cameras, medical imaging, image and video databases, surveillance imaging, video-on-demand systems, and satellite-delivered video.
the other party had access to the copyrighted work, and that the copy is "substantially similar" to the original). In cases where it cannot be said that the owner's work and the possible illegal copy are identical, the existence of a digital watermark could prove guilt. The damages charge can be higher if it can be proven that the party's conduct constitutes willful infringement; that is, s/he copied the work even though s/he knew that it was copyrighted (for example, copying even after having discovered a watermark in the work).
CHAPTER 2
w ate
A cca cco W o r k in g d o m a in
10
a c c .T
Watermark can be visible or invisible: a. Visible watermarks are designed to be easily perceived by a viewer (or listener). They clearly identify the owner of the digital data, but should not detract from the content of the data. b. Invisible watermarks are designed to be imperceptible under normal viewing (or listening) conditions; more of the current research focuses on this type of watermark than the visible type. Both of these types of watermarks are useful in deterring theft, but they achieve this in different ways. Visible watermarks give an immediate indication of who the owner of the digital work is, and data watermarked with visible watermarks are not of as much usefulness to a potential pirate (because the watermark is visible). Invisible watermarks, on the other hand, increase the likelihood of prosecution after the theft has occurred. These watermarks should therefore not be detectable to thieves, otherwise they would try to remove it; however, they should be easily detectable by the owners. A further classification of watermarks is into fragile, semi-fragile or robust: a. A fragile watermark is embedded in digital data to for the purpose of detecting any changes that have been made to the content of the data. They achieve this because they are distorted, or "broken", easily. Fragile watermarks are applicable in image authentication systems. b. threshold. c. Robust watermarks are designed to survive "moderate to severe signal processing attacks". Watermarks for images can further be classified into spatial or spectrum watermarks, depending on how they are constructed: Semi-fragile watermarks detect any changes above a user-specified
11
a.
Spatial watermarks are created in the spatial domain of the image, and are
embedded directly into the pixels of the image. These usually produce images of high quality, but are not robust to the common image alterations. b. Spectral (or transform-based) watermarks are incorporated into the image's transform coefficients. The inverse-transformed coefficients form the watermarked data. Perceptual watermarks are invisible watermarks constructed from techniques that use models of the human visual system to adapt the strength of the watermark to the image content. The most effective of these watermarks are known as image-adaptive watermarks. Finally, blind watermarking techniques are techniques that are able to detect the watermark in a watermarked digital item without use of the original digital item.
12
CHAPTER 3
I. Features of a Good Watermark The following are features of a good watermark: 1. It should be difficult or impossible to remove a digital watermark without noticeably degrading the watermarked content. This is to ensure that the copyright information cannot be removed. 2. The watermark should be robust. This means that it should remain in the
content after various types of manipulations, both intentional (known as attacks on the watermark) and unintentional (alterations that the digital data item would undergo regardless of whether it contains a watermark or not). These are described below. If the watermark is a fragile watermark, however, it should not remain in the digital data after attacks on it, but should be able to survive certain other alterations (as in the case of images, where it should be able to survive the common image alteration of cropping).
3.
should be imperceptible (if it is of the invisible type). Embedding the watermark signal in the digital data produces alterations, and these should not degrade the perceived quality of the data. Larger alterations are more robust, and are easier to detect with certainty, but result in greater degradation of the data. 4. It should be easy for the owner or a proper authority to readily detect the
document or] image would be necessary for efficient recovery of property and subsequent prosecution". Further properties that enhance the effectiveness of a watermarking technique, but which are not requirements are: 5. Hybrid watermarking refers to the embedding of a number of different watermarks in the same digital carrier signal. Hybrid watermarking allows intellectual property rights (IPR) protection, data authentication and data item tracing all in one go. 6. Watermark key: it is beneficial to have a key associated with each
watermark that can be used in the production, embedding, and detection of the watermark. It should be a private key, because then if the algorithms to produce, embed and detect the watermark are publicly known, without the key, it is difficult to know what the watermark signal is. The key indicates the owner of the data. It is of interest to identify the properties of a digital data item (the carrier signal) that assist in watermarking: 1. It should have a high level of redundancy. This is so that it can carry a
more robust watermark without the watermark being noticed. (A more robust watermark usually requires a larger number of alterations to the carrier signal). 2. It must tolerate at least small, well-defined modifications without
14
CHAPTER 4
Fig 4.1 life cycle of DM General digital watermark life-cycle phases with embedding-, attacking-, and detection and retrieval functions The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal. Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack. While the modification may not be malicious, the term attack arises from copyright protection application, where pirates attempt to remove the digital watermark through modification. 15
There are many possible modifications, for example, lossy compression of the data (in which resolution is diminished), cropping an image or video, or intentionally adding noise. Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change is made to the signal.
16
CHAPTER 5
Fig 5.1 process As seen above, Alice creates an original image and watermarks it before passing it to Bob. If Bob claims the image and sells copies to other people Alice can extract her watermark from the image proving her copyright to it.
17
The caveat here is that Alice will only be able to prove her copyright of the image if Bob hasnt managed to modify the image such that the watermark is damaged enough to be undetectable or added his own watermark such that it is impossible to discover which watermark was embedded first.
18
CHAPTER 6
20
CHAPTER 7 21
Technical Details
Digital watermarking technology makes use of the fact that the human eye has only a limited ability to observe differences. Minor modifications in the colour values of an image are subconsciously corrected by the eye, so that the observer does not notice any difference.
22
While vendors of digital watermarking schemes do not publicly release the exact methods used to create their watermarks, they do admit to using the following basic procedure (with obvious variations and additions by each vendor). A secret key (string or integer) produces a random number which determines the particular pixels, which will be protected by the watermarking. The watermark is embedded redundantly over the whole image, so that every part of the image is protected. Secret key
origionl image
Embedding of watermark
protected image
attacks
attacked image
watermark
fig 7.1
One way of doing this is by Patchwork. This technique uses a random number generator to select n pairs of pixels and slightly increases or decrease their luminosity (brightness level). Thus the contrast of this set is increased without any change in the average luminosity of the image. With suitable parameters, Patchwork even survives compression using JPEG. Although the amount of secret information has no direct impact on the visual fidelity of the image or the robustness of the watermark, it plays an important role in the security of the system. The key space, that is the range of all possible values of the secret information, x must be large enough to make exhaustive search attacks impossible.
23
In the process of extracting the watermark, the secret key is used to identify the manipulated pixels and finally to decode the watermark. As an example of poor engineering, an early version of Digimarcs watermarking software gave each licensed user an ID and a two-digitTechnical Details Digital watermarking technology makes use of the fact that the human eye has only a limited ability to observe differences. Minor modifications in the colour values of an image are subconsciously corrected by the eye, so that the observer does not notice any difference. While vendors of digital watermarking schemes do not publicly release the exact methods used to create their watermarks, they do admit to using the following basic procedure (with obvious variations and additions by each vendor). A secret key (string or integer) produces a random number which determines the particular pixels, which will be protected by the watermarking. The watermark is embedded redundantly over the whole image, so that every part of the image is protected. One way of doing this is by Patchwork. This technique uses a random number generator to select n pairs of pixels and slightly increases or decrease their luminosity (brightness level). Thus the contrast of this set is increased without any change in the average luminosity of the image. With suitable parameters, Patchwork even survives compression using JPEG. Although the amount of secret information has no direct impact on the visual fidelity of the image or the robustness of the watermark, it plays an important role in the security of the system. The key space, that is the range of all possible values of the secret information, x must be large enough to make exhaustive search attacks impossible. In the process of extracting the watermark, the secret key is used to identify the manipulated pixels and finally to decode the watermark. As an example of poor engineering, an early version of Digimarcs watermarking software gave each licensed user an ID and a two-digit numeric password, which were issued when she registers with Digimarc and pays for a subscription. 24
The password checking mechanism could easily be removed by flipping a particular flag bit and the passwords had only 99 possibilities so it was short enough to be found by trial and error. A deeper examination of the image also allowed a villain to change the ID and thus the copyright of an already marked image as well as the type of use (such as adult -> general public content). Before embedding a mark, watermarking software usually checks whether there is already a mark in the picture, but this check can be bypassed fairly easily with the result that it is possible to overwrite any existing mark and replace it with another one. The quality of digital watermarks can be judged in two ways; firstly it must be able to resist intentional and unintentional attacks and secondly the embedded watermark must not detract from the quality of the image. The higher the resistance of a watermark against attacks, the higher the risk of the quality of the image being reduced, and the greater the chance of obvious visual artefacts being created.
25
CHAPTER 8
Horizontal Flipping Many images can be flipped horizontally without losing quality. Few watermarks survive flipping, although resilience to flipping is easy to implement.
26
27
JPEG Compression/Re-compression
JPEG is a widely used compression algorithms for images and any watermarking system should be resilient to some degree to compression or change of compression level e.g. from 71% to 70% in quality like the example at left.
28
Scaling
Uniform scaling increases/decreases an image by the same % rate in the horizontal and vertical directions. Non-uniform scaling like the example at left increases/decreases the image horizontally and vertically at different % rates. Digital watermarking methods are often resilient only to uniform scaling.
29
Dithering
Dithering approximates colors not in the current palette by alternating two available similar colors from pixel to pixel. If done correctly this method can completely obliterate a watermark, however it can make an image appear to be patchy when the image is over-dithered (as in the elbow area of the image at left).
30
Jitter
The simplest and most effective attack on any audio watermarking scheme is to add jitter to the signal. In our first implementation, we split the signal into chunks of 500 samples, either duplicated or deleted a sample at random in each chunk (resulting in chunks of 499 or 501 samples long) and stuck the chunks back together. This turned out to be almost imperceptible after altering, even in classical music; but the jitter prevents the marked bits from being located, and therefore the watermark is obliterated. In his paper titled Audio watermarking: Features, Applications And Algorithms, Michael Arnold agrees with the Cambridge team stating that one of the greatest challenges [of watermarking] is the robustness against the so-called jitter attack.
31
Fig8.6 Jitter
Video
At present there is no known method to remove a digital watermark from a stream of video. This is probably because those who trade in pirated video, (especially in DivX format), store their pirated movies locally on their hard disk drives or on CD-R disks where they cannot be checked for watermarks by anyone. 32
Mosaic
A mosaic attack doesnt damage the watermarked image or make it lose quality in any way, but still enables the image to be viewed in eg: a web browser by chopping the image into subsections of equal size and putting it back together again. To the viewer a mosaic image appears to look the same as the original but a web crawler like DigiMarcs MarcSpider sees many separate images and doesnt detect that these separate images are parts of a watermarked image. This means that the watermark cannot be detected, as a problem common to all image watermarking schemes is that they have trouble embedding watermarks into small images, (less than 256 pixels in height or width).
33
Stirmark
StirMark is the industry standard software used by researchers to automatically attempt to remove watermarks created by Digimarc, SysCoP, JK_PGS (TALISMAN project .P.F.L. algorithm), Signum Technologies and EIKONAmark. Stirmark attacks a given watermarked image using all the techniques mentioned in this report as well as more esoteric techniques such as low pass filtering, gamma correction, sharpening/unsharpening etc. All vendors of digital watermarks have their products benchmarked by Stirmark and as of August 2001, no watermark from any vendor survives the test, ie: the watermarks are all removed without degradation to image quality occurring.
Contradicting Requirements
34
I(x,y)
IW(x,y)
Multiplybygain factor k
W(x,y):PseudoRandomPattern{1,0,1}
35
ALGORITHMS
MPEG1 Layer III (MP3) audio compression
A digital audio compression algorithm that achieves a compression factor of about twelve while preserving sound quality. What this lossy compression does is remove the frequencies not heard by the human ear from the audio. If a raw audio file is converted to MP3 at a bit-rate of 128kbps than roughly 90% of the frequencies are removed. This means that a search for the watermark needs to find an unaltered length of samples that contains at least 2 watermarked bits to prove the watermarks existence.
Audio restoration programs are designed to remove hisses, crackles and pops from audio recordings. They do this by searching through the wavelength, removing samples that dont fit in amongst neighbouring samples, and replacing them with an average of the two neighbour samples. Although the removal of digital watermarks is obviously not a purpose of these programs, they work remarkably well at doing so as the sample bits inserted to watermark the audio dont fit in with their surrounding pixels, and are therefore removed. Echo Hiding Removal
36
Echo hiding relies on the fact that we cannot perceive short echoes, eg: 1 millisecond(ms) and embeds data into a cover audio signal by introducing an echo characterised by its delay and its relative amplitude compared to surrounding samples. The echo delays are chosen between 0.5 ms and 2 ms and the best relative amplitude of the echo is around 0.8 ms. However specialised software which looks for echoes with a length between 0.5 ms and 2 ms (as seen below), can be used to detect and remove these echoes without effecting sound quality.
37
38
CHAPTER9
ATTACKS ON WATERMARKS
Lossy Compression: Many compression schemes like JPEG and MPEG can potentially degrade the datas quality through irretrievable loss of data. Geometric Distortions: include such operations as rotation, translation, scaling and cropping. Common Signal Processing Operations: They include the followings. D/A conversion, A/D conversion Resampling, Requantization, Recompression Linear filtering such as high pass and low pass filtering. Addition of a constant offset to the pixel values Local exchange of pixels other intentional attacks: Printing and Rescanning Watermarking of watermarked image (rewatermarking)
39
CHAPTER 10
AUTHENTICATION Authentication identifies if content has been altered or falsified. For example digital watermarking can verify authenticity and identify counterfeiting as a second layer of security for encrypted content. The presence of digital watermark and/or continuity of watermark can help ensure that the content has not been altered.
BROADCAST MONITORING Broadcast content is embedded wit a unique identifier, and optionally, distributor information. Detectors are placed at popular markets, where broadcasts are received and processed, resulting in reports to be sent to the owner. COPY PREVENTION Copy prevention helps the digital watermarks to identify whether the content can be copied. It guards against unauthorized duplication. 40
FORENSIC TRACKING Forensic tracking locates the source of the content. The key advantage of digital watermarking is that it enables tracking of the content to where it leaves an authorized path. E-COMMERCE/LINKING The digital watermarking enables the user to purchase or access information about the content, related content, or items with in the content.
41
CHAPTER 11
Across all the digital watermarking literature researched no mention was made of any australian company implementing or selling a digital watermarking technique. The only known group researching digital watermarks in Australia is the Secure Multimedia Information Communication Research Labs at the University Of Wollongong http://www.itacs.uow.edu.au/research/smicl/.This research team is supported by the Motorola Australian Research Centre, Visual Information Processing Lab.
42
CHAPTER 12
WATERMARKING SOFTWARE&SREVICES
1. 2. 3. 4. e.t.c. 5. MediaSec: Provide software for various media types, partial encryption, and internet tracking. Alpha-Tec: watermarking software for copyright protection and infringement Digimarc: For document verification, copyright protection, embedded Stegnosign: For creating, embedding and detecting watermarks. Signum: Allow digital fingerprints to be embedded into grahics, audio, video
43
CHAPTER 13
CONCLUSION
Digital watermarks have been used in the last few years to protect the ownership of digital data. Various techniques developed make use of the human audio-visual system. Legitimate business and webmasters have nothing to fear from copyright law or new form of on-line enforcement technology found in digital watermarks and tracking services. By using audio files and images only when they have obtained permission of the appropriate owner, webmasters should be free to continue making their sites audio visually appealing.
44
CHAPTER14 REFERENCES
1. 2. 3. 4.
45