study and analysis of digital water marking techniques · ijcst vo l. 8, is s u e 1, ja n - ma r c...

4
IJCST VOL. 8, ISSUE 1, JAN - MARCH 2017 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) www.ijcst.com 14 INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY Study and Analysis of Digital Water Marking Techniques 1 Dr. Anubhav Kumar, 2 Dr. Arvind K Sharma 1 HOD CSE, SSCET, Bandhani, Pathankot, India 2 Dept. of CSI, University of Kota, Rajasthan, India 2 Research Supervisor, Career Point University, Kota 2 PhD Supervisor, OPJS University, Churu, Rajasthan Abstract Today, the growth of the Internet along with the increasing availability of multimedia applications has been produced a number of copyright issues. The digital data has been duplicated and edited with great ease which has led to a need for effective copyright protection tools. One of the areas that this growth has fuelled is that of digital watermarking. It is a technique that allows us to add hidden copyright notices, verification messages or any other useful information to the original signal. The hidden message can be a group of bits that describes something about the signal or about the genuine author of the signal. In this paper, a brief overview about various digital water marking techniques for different media types is presented. Keywords Digital Watermarking, Security, Copyright I. Introduction Digital watermarking is a technique that allows us to add hidden copyright notices to digital audio, video, or image signals and documents. The technique takes its name from watermarking of paper or money as a security measure. Digital watermarking is not a form of steganography in which data is hidden in the message without the end user’s knowledge. It is a digital signal or pattern inserted into a digital image. Since this signal or pattern is present in each unaltered copy of the original image, the digital watermark may also serve as a digital signature for the copies. A given watermark may be unique to each copy, or be common to multiple copies. The watermarking of the document involves the transformation of the original into another form. This distinguishes digital watermarking from digital fingerprinting where the original file remains intact, but another file is created that “describes” the original file’s content. This technology opens a new door to authors, producers, publishers, and service providers for protecting their rights and interests in multimedia documents. II. History The term “digital watermark” was first coined in 1992 by Andrew Tirkel and Charles Osborne, in their paper: A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A. Mee, C.F. Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673. The term used by Tirkel and Osborne was originally used in Japan from the Japanese “Denshi Sukashi” literally, an “Electronic Watermark”. Paul Levinson- Future of the Information Revolution (1997), where he called for the use “smart patent numbers” (p. 202), or the embedding of electronic chips in every piece of technology, which would give an updated listing of all of its inventors. Whereas a digital watermark can be a form of steganography, e.g., the digital watermark is hidden in plain view. Functionally, the term “digital watermark” is used to describe that which enables differentiation between copies of the “same” content in an imperceptible manner. Many watermarking systems take this a step further, hiding the data so that attempts at erasure results in degradation of the quality of the content. III. Purpose of Digital Watermarking Watermarking has been proposed to trace images in the event of their illicit redistribution. In past infringement with copyrighted documents was often limited by the unfeasibility of large-scale photocopying and distribution, modern digital networks make large-scale dissemination simple and inexpensive. Digital watermarking makes it possible to uniquely mark each image for every buyer. IV. Classification of Digital Watermarking A. Video Watermarking Video watermarking can be considered as a superset of normal image watermarking. All the techniques applicable to static images can be applied to video images. However, due to the high frame rate of video, the embedding process must occur almost in real time for live transmissions. If the content is generated off-line, this limitation does not exist. A very popular form of on-line video watermarking is the usage of a visible watermark. Fig. 1: Video Watermarking B. Audio Watermarking Audio watermarking is currently at the forefront of technology development in an attempt to prevent illegal reproduction and redistribution. One implementation receiving widespread attention is the MP3 approach to audio compression and watermarking. Audio watermarking can be successfully implemented at frequencies outside the normal human audible range.

Upload: others

Post on 16-May-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Study and Analysis of Digital Water Marking Techniques · IJCST Vo l. 8, IS S u e 1, Ja n - Ma r C h 2017 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) 14 INterNatIONal JOurNal

IJCST Vol. 8, ISSue 1, Jan - MarCh 2017 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

w w w . i j c s t . c o m 14 INterNatIONal JOurNal Of COmPuter SCIeNCe aNd teChNOlOgy

Study and Analysis of Digital Water Marking Techniques1Dr. Anubhav Kumar, 2Dr. Arvind K Sharma1HOD CSE, SSCET, Bandhani, Pathankot, India

2Dept. of CSI, University of Kota, Rajasthan, India2Research Supervisor, Career Point University, Kota2PhD Supervisor, OPJS University, Churu, Rajasthan

Abstract Today, the growth of the Internet along with the increasing availability of multimedia applications has been produced a number of copyright issues. The digital data has been duplicated and edited with great ease which has led to a need for effective copyright protection tools. One of the areas that this growth has fuelled is that of digital watermarking. It is a technique that allows us to add hidden copyright notices, verification messages or any other useful information to the original signal. The hidden message can be a group of bits that describes something about the signal or about the genuine author of the signal. In this paper, a brief overview about various digital water marking techniques for different media types is presented.

KeywordsDigital Watermarking, Security, Copyright

I. IntroductionDigital watermarking is a technique that allows us to add hidden copyright notices to digital audio, video, or image signals and documents. The technique takes its name from watermarking of paper or money as a security measure. Digital watermarking is not a form of steganography in which data is hidden in the message without the end user’s knowledge.It is a digital signal or pattern inserted into a digital image. Since this signal or pattern is present in each unaltered copy of the original image, the digital watermark may also serve as a digital signature for the copies. A given watermark may be unique to each copy, or be common to multiple copies. The watermarking of the document involves the transformation of the original into another form. This distinguishes digital watermarking from digital fingerprinting where the original file remains intact, but another file is created that “describes” the original file’s content. This technology opens a new door to authors, producers, publishers, and service providers for protecting their rights and interests in multimedia documents.

II. HistoryThe term “digital watermark” was first coined in 1992 by Andrew Tirkel and Charles Osborne, in their paper: A.Z.Tirkel, G.A. Rankin, R.M. Van Schyndel, W.J.Ho, N.R.A. Mee, C.F. Osborne. “Electronic Water Mark”. DICTA 93, Macquarie University. p.666-673. The term used by Tirkel and Osborne was originally used in Japan from the Japanese “Denshi Sukashi” literally, an “Electronic Watermark”. Paul Levinson- Future of the Information Revolution (1997), where he called for the use “smart patent numbers” (p. 202), or the embedding of electronic chips in every piece of technology, which would give an updated listing of all of its inventors. Whereas a digital watermark can be a form of steganography, e.g., the digital watermark is hidden in plain view. Functionally, the term “digital watermark” is used to describe that which enables differentiation between copies of the “same”

content in an imperceptible manner. Many watermarking systems take this a step further, hiding the data so that attempts at erasure results in degradation of the quality of the content.

III. Purpose of Digital WatermarkingWatermarking has been proposed to trace images in the event of their illicit redistribution. In past infringement with copyrighted documents was often limited by the unfeasibility of large-scale photocopying and distribution, modern digital networks make large-scale dissemination simple and inexpensive. Digital watermarking makes it possible to uniquely mark each image for every buyer.

IV. Classification of Digital Watermarking

A. Video WatermarkingVideo watermarking can be considered as a superset of normal image watermarking. All the techniques applicable to static images can be applied to video images. However, due to the high frame rate of video, the embedding process must occur almost in real time for live transmissions. If the content is generated off-line, this limitation does not exist. A very popular form of on-line video watermarking is the usage of a visible watermark.

Fig. 1: Video Watermarking

B. Audio WatermarkingAudio watermarking is currently at the forefront of technology development in an attempt to prevent illegal reproduction and redistribution. One implementation receiving widespread attention is the MP3 approach to audio compression and watermarking. Audio watermarking can be successfully implemented at frequencies outside the normal human audible range.

Page 2: Study and Analysis of Digital Water Marking Techniques · IJCST Vo l. 8, IS S u e 1, Ja n - Ma r C h 2017 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) 14 INterNatIONal JOurNal

IJCST Vol. 8, ISSue 1, Jan - MarCh 2017

w w w . i j c s t . c o m INterNatIONal JOurNal Of COmPuter SCIeNCe aNd teChNOlOgy 15

ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

Fig. 2: Audio Watermarking Process

C. Text WatermarkingText can be subdivided into two categories: raw unformatted ASCII text and formatted text.Watermark information can be embedded into a formatted document using an approach based on the slight adjustment of inter-line and inter-word spacing. Another approach to watermark embedding is to consider the typeset text as one large image and thus to use the typical approaches used for images.Raw text presents a big problem to the watermark process. At this stage no successful approach is known. One possible approach is based on adding white space characters after each sentence.

Fig. 3: Text Watermarking

V. Applications

A. Authentication & Integrity VerificationWatermarks should be able to detect even the slightest change 1. in the document.A unique key associated with the source is used to create the 2. watermark and then embed in the document.This key is then used to extract the watermark and the integrity 3. of the document verified on the basis of the integrity of the watermark & used to avoid unauthorized duplication and distribution.A distinct watermark is embedded in each copy of the data4. If unauthorized copies are found, the origin of the copy can 5. be determined by retrieved.

B. Ownership Assertion‘A’ uses a private key to generate a watermark and embeds 1. it in the document‘A’ makes the watermarked image publicly available2. ‘B’ claims that he owns the image derived from the public 3. image

‘A’ produces the unmarked original and establishes the 4. presence of ‘A’s watermark

C. Content LabelingBits embedded in the data, comprise an annotation, giving 1. some more information about the data.Digital cameras annotate images with the time and date, when 2. the photograph was taken.Medical imaging machines annotate images (X-Rays) with 3. patients name, ID.

D. Usage Control & Copy ProtectionDigital watermark inserted to indicate the number of copies 1. permitted.Every time a copy is made the hardware modifies the 2. watermark and at the same time it would not create any more copies of the data.Commonly used in DVD technology.3.

E. Content ProtectionContent owner might want to publicly and freely provide a 1. preview of multimedia content being sold.To make the preview commercially useless, content is stamped 2. with visible watermark

Fig. 4: Classification of Watermarking

VI. CharacteristicsUnobtrusive:1. Invisible enough not to degrade the data quality and to prevent an attacker from finding and deleting it.Readily Detectable:2. The data owner or an independent control authority should easily detect it.Unambiguous: 3. Retrieval of it should unambiguously identify the data owner.Innumerable: 4. It should be possible to generate a large number of watermarks, all distinguishable.Robust: 5. Difficult to remove for an attacker, who would like to destroy it in order to counterfeit the copyright of the data. Moreover, removal of it should cause a considerable

Page 3: Study and Analysis of Digital Water Marking Techniques · IJCST Vo l. 8, IS S u e 1, Ja n - Ma r C h 2017 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) 14 INterNatIONal JOurNal

IJCST Vol. 8, ISSue 1, Jan - MarCh 2017 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

w w w . i j c s t . c o m 16 INterNatIONal JOurNal Of COmPuter SCIeNCe aNd teChNOlOgy

degradation in the quality of the data.Fragile: 6. It should not be easily broken or destroyed.Visible watermarks should be visible enough to discourage 7. theft.

VII. TechniquesDigital watermarking techniques is nothing but what are the techniques to put digital watermarks onto the digital media. There are three techniques viz image domain and transform domain. These techniques are can be described in detail as follows.

A. Image Domain EncodingThis technique of image watermarking is also known as Least Significant Bit (LSB).This technique stores the large information in an image without reducing the quality of image. Image domain tools use bit wise methods to encode the watermark. Using encryption and compression, a file that is almost as big as image can be stored inside it with minimal distortion. LSB works by reducing the number of colors used by image itself and uses rest of palette to encode the information using slight variations of the color. If the colors in an image are less, then more information can be stored without reducing the quality. This method is useful to store large data but message can be destroyed by altering it.

Fig. 5: Example of Domain Transfer Image

B. Transform DomainThe second common method is Discrete Cosine Transformation (DCT) and falls under Transform Domain. It uses manipulation of image algorithms and image transformation. This method stores small image throughout the image.This method uses JPEG images. It alters the algorithm used to record the difference between the pixels, which is basis for JPEG encoding. If you use more bits for encoding the watermark, either the image is larger or low quality will be there. Some algorithms used in this method encode the message so well that the image can be printed out, scanned back in, and the copyright can still be read.

Fig. 6: Example of a Domain Transfer Image

C. MaskingA watermark is processed and placed over the original, so that if a difference file is made of the two, the watermark stands out to the human eye. Dithering the mask can also make the alteration of the photo less noticeable, as it removes sharp edges of change. This alters the image characteristics rather than bits, so it could be considered to fall under the Transform Domain.Text watermarks can be of three basic kinds: text line coding, which is when the text lines of a certain document page are shifted up or down very slightly that is cannot be noticed; Word space coding, which is when the spacing between words in a line of justified text is altered and; Character coding, which is when a feature such as the end line at the top of a letter is extended so that the altered text goes unnoticed.In the case of watermarking video, it is difficult to do because it is a sequence of images, and would be time consuming to process each frame. You could process only every other frame, but then the watermark could be destroyed by eliminating or modifying every second frame, and overall quality would not be overly damaged.

Fig. 7: Example of a Masked Image

VIII. Advantages/LimitationsSome special watermarking technique uses color separation. So, watermark appears in only one of the color bands. Therefore, watermarks become strongly invisible. When ever, the colors are separated from printing then watermark becomes visible. This approach is advantageous to journalists to inspect digital pictures from a photo stock house before buying an un-watermarked.There is an important advantage of invisible fragile watermarks. With such invisible fragile watermarks, implementation of web base image authentication. This web based authentication includes watermark embedding and authentication system. In case of watermark embedding system, it is installed in server as application software that any authorized user who access to server can generate watermark image. The distribution can be done through any network as FTP, e-mail etc. Once, image is distributed to externally, client can get authentication web page to get verification of images. There are some limitations also to this digital watermarking.Digital watermarking is recent research field; therefore its intrinsic limitations are not understood yet. The blind watermarking algorithm which is really robust is not in existence today. Another disadvantage is that owner can erase the watermark. By knowing the exact content of watermark and algorithms to embed and retrieve it. It is always possible to make it unreadable without any significant degradation of the data. Again it is not clear that if this drawback will be got around in future in the meantime the possibility of erasing the watermark or its part ,once its content

Page 4: Study and Analysis of Digital Water Marking Techniques · IJCST Vo l. 8, IS S u e 1, Ja n - Ma r C h 2017 ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print) 14 INterNatIONal JOurNal

IJCST Vol. 8, ISSue 1, Jan - MarCh 2017

w w w . i j c s t . c o m INterNatIONal JOurNal Of COmPuter SCIeNCe aNd teChNOlOgy 17

ISSN : 0976-8491 (Online) | ISSN : 2229-4333 (Print)

is known must be taken into account when designing a copyright protection system. As a matter of fact if one is allowed to read the watermark, then he/she can erase it by knowing the embedding algorithm. In some researches, the conclusion comes that not all watermarking techniques will be useful in resolving ownership disputes. Watermarking doesn’t prevent image copying as much as it simply makes copied images easier to track down and detect ownership. Some watermarks vanish if someone manipulates the image in a program like Photoshop. The watermarks have been known to weaken or disappear by the time the images were processed for the Internet. Resizing, compressing and converting images from one file type to another may add noise to an image or diminish its watermark in such a manner that the watermark becomes unreadable.

IX. Future AspectAn exhaustive list of watermarking applications is of course impossible. However, it is interesting to note the increasing interest in fragile watermarking technologies. Especially applications related to copy protection of printed media are very promising. In addition to technological developments, marketing and business issues are extremely important and require in-depth analysis and strategic planning. It is very important to prepare the industry to the usage of digital watermarks and to convince them of the added value their products can gain if they employ digital watermarking technologies.

X. ConclusionDigital watermarking is not a copyright enforcement technology, but on the one hand it can provide evidence for copyright infringements after the event, on the other hand, it may serve as a kind of deterrent to illicit copying and dissemination of copyrighted documents, therefore to decrease their occurrences in advances. Moreover, it is perfectly complementary to enforcement tools which attempt to restrict and control copying or use of copyrighted documents. In this paper we have presented various aspects for digital watermarking like overview, history, working principle, classification, future aspects, and techniques. This paper will open a window to the new researchers to get the maximum knowledge in this domain.

References[1] Lian Zhao, Eckhard Koch,"A Digital Watermarking System

for Multimedia Copyright Protection".[2] Dr. Martin Kutter, Dr. Frédéric Jordan,"Digital Watermarking

Technology".[3] Santi Prasad Maity, Malay Kumar Kundu,"Robust and Blind

Spatial Watermarking in Digital Image".[4] Dr. Cai Jianfei,"Spread Spectrum Based Digital Watermarking

Design".[5] Neerav Bhatt,"An article on Digital Watermarking".[6] R. Schyndel, A. Tirkel, C. Osborne,“A Digital Watermark,”

Proc. IEEE Int. Conf. on Image Processing, Nov. 1994, Vol. 2, pp. 86-90.

[7] I. Cox, M. Miller, B. Jeffrey,"Digital Watermarking: Principles and Practice", Morgan Kaufmann, 2002.

[8] [Online] Available: http://en.wikipedia.org/wiki/Digital_watermarking

[9] [Online] Available: http://web.vu.union.edu/~shoemakc/watermarking/watermarking.html#lsb-modification

[10] Watermarking and Data Hiding, [Online] Available: http://www-nt.e-technik.uni erlangen.de/~hartung/

watermarkinglinks.html[11] The DICE Company, [Online] Available: http://www.digital-

watermark.com/[12] Patrick's Watermarking Page, [Online] Available: http://www-

sigproc.eng.cam.ac.uk/~pl 201/watermarking/[13] Electronic Watermarks, Copy Control, Fingerprints, [Online]

Available: http://buffy.eecs.berkeley.edu/~linnartz/water.html

[14] Watermark Webring, [Online] Available: http://nav.webring.yahoo.com/ hub? ring=watermarking & list

[15] Digital Watermarking, [Online] Available: http://www.cosy.sbg.ac.at/~pmeerw/ Watermarking/“It’s the Pricing, Stupid”, Stereophile, Oct 25, 2001.

[16] Watermarking of Video and Multimedia Data, [Online] Available: http://www-nt.e-technik.uni-erlangen.de/~hartung/watermarking.htm

[17] [Online] Available: http://www.cl.cam.ac.uk/~fapp2/watermarking/2mosaic/

[18] [Online] Available: http://www.watermarkingworld.org/[19] [Online] Available: http://www.ee.ust.hk/~eepeter/

watermark

Dr. Anubhav Kumar has received Ph.D degree in Computer Science Engineering from the School of Computer and System Sciences, Jaipur National University, Jaipur. He has over 8+ years of teaching experience and authored, co-authored almost 35 research papers in National, International Journals and Conferences. His current area of research includes ERP, KM, Web Usage Mining, 3D Animation. He is a Senior Member

of numerous academic and professional bodies such as: IEEE, WASET, IAENG Hong Kong, IACSIT Singapore, UACEE UK, Association for Computing Machinery Inc. (ACM), New York. He is also Reviewer and Editorial Board Member of many International Journals such as IJRECE, IJCAT,IJCDS, IJMR, IJMIT & IJCT. Besides it, he is guiding a few number of M.Tech & Ph.D Scholars in the area of Computer Science Engineering.

Dr. Arvind K Sharma has received his Ph.D degree in Computer Science in the year 2013. He has more than 13 year of work experience in academic fields. He has published more than 40 Papers in many National, International Journals and Conference Proceedings. He is a Managing Editor of International Journal of Computer Science and Technology. He is also Editorial Board Member and Reviewer of several National and International Journals

and Conferences. He is a Member of numerous academic and professional bodies such as IEEE, WASET, IEDRC, IAENG Hong Kong, IACSIT Singapore, UACEE UK, ACM, New York. Apart from it, he is guiding a few numbers of M.Tech & Ph.D Scholars in the area of Computer Science and Engineering. His area of interest includes- Web Usage Mining, Web Engineering, Opinion Mining, Data Analytics and Machine Learning Tools.