Actions

Digital Watermarking

Definition of Digital Watermarking

Digital Watermarking is the method of embedding data into digital multimedia content. This is used to verify the credibility of the content or to recognize the identity of the digital content's owner. Digital watermarking can be employed for multiple purposes, such as:

  • Copyright protection
  • Source tracking
  • Broadcast tracking, such as watermarked videos from global news organizations
  • Hidden communication[1]


Classification of Digital Watermarking Techniques[2]

A number of different watermarking techniques have been developed. Most of them can be classified into one of the categories shown in the Figure below. From the perceptual aspect, the watermark can be classified as either

  • perceptible or
  • imperceptible.

Noticeable watermark visibly changes the original content. It is sometimes used to protect images and videos, but generally it is not very popular nowadays. This technique involves embedding characters that uniquely identify the owners of the content and appear as a background image, or as a visible sign. However, water mark of this type can be removed. Almost all currently used techniques fall into the class of imperceptible techniques. Imperceptible techniques are further divided into

  • robust techniques
  • semi-fragile and
  • fragile watermarking techniques.

Fragile watermarking assumes embedding of certain watermark that will be significantly damaged or removed in an attempt to 38 modify the content. These techniques are useful in proving the data authenticity.
In semi-fragile watermarking, the watermark should be resistant to certain signal processing techniques (e.g., compression), while it is fragile under any other attack.
However, the most commonly used techniques are based on robust watermarking. Robust techniques involve embedding a watermark in the original signal, such that the watermark removal causes serious degradation of the signal quality. Watermark should be designed to be robust to the standard signal processing approaches (compression, filtering, etc.), as well as to intentional attempts to remove the watermark.

Watermarking techniques are further divided by the domains in which the water mark is embedded. Namely, the watermark can be embedded directly in the signal domain, or in one of the transform domains. The choice of the watermarking domain depends on the type of multimedia data and the watermarking application. The most frequently used transform domains are based on the DFT, DCT, and DWT transforms. The transform domain watermarking is more convenient for modeling the spectral characteristics of watermark according to the human perceptual model.For highly nonstationary signals, the modeling can be achieved by using time frequency transforms.

Watermarking Techniques


Applications of Digital Watermarking[3]

  • Watermarks are used in forensics. Tampered evidence is unacceptable in forensics and Watermarked images are acceptable.
  • This is used by brands. The Digital Watermarking is done so that the authority of the digital media is intact.
  • Digital Watermarking prevents copying of the data.
  • Video editing software use watermarks so that people buy the full version of it.
  • It is used in video authentication. News channels often show videos of other agencies which are watermarked.
  • It is also used for ID card security.
  • It is used for content management in social media.


Digital Watermarking Lifecycle Phases[4]

The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal.


General digital watermark lifecycle phases


Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack. While the modification may not be malicious, the term attack arises from copyright protection application, where third parties may attempt to remove the digital watermark through modification. There are many possible modifications, for example, lossy compression of the data (in which resolution is diminished), cropping an image or video, or intentionally adding noise.

Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In robust digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In fragile digital watermarking, the extraction algorithm should fail if any change is made to the signal.


The Future of Digital Watermarking[5]

A number of companies, such as the Digimarc Corporation, Sony and IBM have introduced digital watermarking software applications that allow individuals to imbed watermarks within image, audio and video files to protect them from copyright infringement. The watermarks may be viewed with software and can reveal either a unique identification code that can be traced to the copyright owner or specific information about the copyright owner.

Companies are also offering on-line tracking services so that the copyright owner can see how the owner's materials are used via the Web. These processes will continue to help the fight against electronic copyright infringement.


Advantages and Disadvantages of Digital Watermarking[6]

Advantages

  • Uniquely identifies the author of copyrighted work.
  • Implementation on PC platform is possible.
  • Embedding watermark is easy
  • Image Tampering Detection

Disadvantages

  • Watermarking doesn’t prevent image copying but we can track down and detect ownership of copied images.
  • Watermarks vanish if someone manipulates the image.
  • Resizing, compressing images from one file type to another may diminish the watermark and it becomes unreadable.


References

  1. What does Digital Watermarking mean? Techopedia
  2. Classification of Digital Watermarking Techniques Srdjan Stankovic, Irena Orovic, Ervin Sejdic
  3. What are the Applications Digital Watermarking is Used for? GeeksforGeeks
  4. Digital Watermarking Lifecycle Phases Wikipedia
  5. The Future of Digital Watermarking Legal Zoom
  6. Advantages and Disadvantages of Digital Watermarking Tripti Rajvanshi