Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Security

Architectures for Forensic Watermarking


Watermarking Concepts
In the broadest sense, watermarking is the incorporation of some data into content "essence" in such a way so that the data can subsequently be read (recovered) from copies of content. By essence we mean the data representing the picture and / or sound, and not some other side channel. The process of creating a watermark in a content item is called watermark embedding, and the additional data, in its embedded form, is called the watermark. The process of reading the watermark from a copy of the content is called watermark recovery.

Watermark technology is applicable to many media, but is commonly discussed in terms of motion video. This paper will take that perspective, although most of the concepts are directly translatable to sound or even to still images. Content will be consumed (viewed) using a variety of equipment types, commonly set-top boxes. But for the sake of generality, this paper refers to the content playback equipment as a "rendering device".

It is useful to conceptualize watermarking as a communications or signal processing problem. In this paradigm, the watermark information becomes the data to be communicated, and the content becomes the carrier signal. Indeed, the content carrying the watermark is often referred to as the host signal. From a communications standpoint, the perceptible features of the content constitute noise that interferes with the watermark's information signal. The watermark itself may consist of changes to the host signal features; the watermark may thus be viewed as modulating the host signal. In either case, the host signal constitutes a very noisy carrier for the watermark.

Common attributes of watermarks and watermark systems are:
Perceptible vs. Imperceptible Watermarks - Watermarks may either be apparent to the consumer when the content is rendered, or disguised in such a way that the viewer is unlikely to notice the watermark's presence. Perceptible watermarks are commonly used to designate ownership, exemplified by the quite visible logo appearing in many network broadcasts. Forensic watermarks, on the other hand, are typically designed to be imperceptible, in order to secure the watermark information and to avoid degrading the content. In general, watermarks fall along a continuum of perceptibility, according to the needs of the users and the capabilities of the technology. The field of steganography, the technology of hiding messages in content such that the casual observer is unaware of the message's existence, includes imperceptible watermarking.

Readable vs. Detectable Watermarks - A watermark may carry only a single bit of information, that is, the watermark is significant only in its presence or absence. Such watermarks are classified as detectable. A readable watermark, by contrast, contains a more complex message, typically many bits of information. Mathematically, a readable watermark with N bits of information could be conceptualized as having been chosen from a set of 2N detectable watermarks. For a message of useful length, the number of marks in the set becomes unmanageable, so a practical readable watermark implementation must include a means of decomposing the watermark to reconstruct the message from independent parts.

Forensic watermarks must carry a message: a readable watermark, or a series of detectable watermarks is required. In the latter case, the message is treated as a series of independent bits, each of which is represented by a single detectable watermark.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.