International Journal of Engineering Trends and Technology- May to June Issue 2011 Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications S.Vimala1, J.Saravanan2 ,T.S. Sumi1 1 Faculty, M.C.A, Panimalar Engineering College, Chennai, 2 P.G Scholar, M.C.A, Panimalar Engineering College, Chennai, 3 Faculty, M.C.A, Panimalar Engineering College, Chennai. Abstract- Watermarking embeds ownership information in digital content. Watermark describes information that can be used to prove the ownership of relational database. Here the embedding is hidden that the presence of watermarking is invisible to the user. The proposed approach permits us to successfully combine the secure embedding of client side with the superior robustness of informed embedding techniques, providing a new powerful tool for the secure distribution of highquality multimedia contents. Open issues in the proposed framework to be addressed in the future research concern the need of higher security and the compression overhead. Clientside watermark embedding systems have been proposed as a possible solution for the copyright protection in large-scale content distribution environments. In this framework, we propose a new look-up-table-based secure client-side embedding scheme properly designed for the spread transform dither modulation watermarking method. Index Terms- content distribution, secure watermark embedding, multiple decryption, ST-DM informed embedding, fingerprinting. I. INTRODUCTION Content protection measure for the prevention of copyright violations from unauthorized user is the new challenge in large scale content distribution environments. Watermarking is solution for this problem. This technique is used to embed into each copy the content a unique code identifying a particular user or device. Current content distribution systems are based on a clientserver architecture, where the watermark embedding is usually carried out by a trusted server. However in large scale distribution systems the server may become overloaded, due to the fact that the computational burden grows linearly with the number of users. In addition, since the distribution of individually watermarked copies requires point-to- point connections, bandwidth requirements can become prohibitive. A possible solution consists in using client-side watermark embedding: the server is allowed to send a unique copy of the content to all the interested users through broadcasting. Each client will be in charge of embedding a watermark identifying the received copy. Since the client is untrusted, the users should not have access to the original content or to the secret information required to embed the watermark. In secure watermark embedding schemes, the server transmits the same ISSN:2231-5381 encrypted version of the original content to all the clients but a client-specific decryption key allows decrypting the content and at the same time to implicitly embed a watermark to obtain a uniquely watermarked version of the content. Here we are interested in techniques based on encryption systems that allow the use of multiple decryption keys, which decrypt the same cipher text to slightly different plaintexts. The difference between original and decrypted content represents thus the hidden watermark. A special stream cipher, called Chameleon, which allows decrypting the cipher text in slightly different ways. During encryption, a sequence of indices is used to select four entries from a look-up-table (LUT) for each plaintext element. These entries are XORed with the plaintext to form the cipher text. The decryption is identical to encryption except for the use of a decryption LUT that superimposes some errors onto the content, thus leaving a unique watermark. Generalizations of Chameleon, suitable for embedding spread spectrum watermarks, have also been proposed. In this paper, we propose a LUT based secure embedding system designed for the Spread Transform Dither Modulation (STDM) algorithm belonging to the class of data hiding schemes defined informed embedding algorithms or hostinterference rejecting methods. II. LUT BASED WATERMARK EMBEDDING The LUT based secure embedding proposed in works as follows. The distribution server generates a long- term master encryption look-up table E of size T, whose entries E[t] are independently and randomly generated according to a Gaussian distribution. The LUT E will be used to encrypt the content to be distributed to the KU clients. Next, for the k-th client, the server generates a personalized watermark LUT Wk according to a desired probability distribution, and builds a personalized decryption LUT Dk by combining componentwise master encryption LUT E and watermark LUT Wk: Dk[t] = −E[t] +Wk[t], t= 0, 1, . . . , T – 1 (1) The personalized LUTs are then transmitted once to each client over a secure channel. A content, represented as a vector x of size M, is encrypted by adding to each element R entries of the LUT E pseudo -97- IJETT International Journal of Engineering Trends and Technology- May to June Issue 2011 randomly selected according to a session key sk. The encrypted content c is sent to all the authorized clients along with the session key sk. The k-th client can decrypt c by using his/her personalized decryption LUT Dk, with the final effect that a spread-spectrum watermark sequence is embedded into the decrypted content yk, through an additive rule. In detail, driven by the session key sk, a set of M・R values tij in the range [0, T −1] is generated, where 0 ≤ i ≤ M−1, 0 ≤ j ≤ R−1. Each feature xi is encrypted by adding R entries of E, obtaining the encrypted feature ci: Joint decryption and watermarking is accomplished by reconstructing with sk the same sequence of indices tij and by adding R entries of Dk to each encrypted feature ci: Starting from an original vector composed by M features, a M×Md projection matrix S = (s1, s2,. . . , sMd ) whose columns are orthogonal is generated. The host features are projected according to S, which, differently from the traditional ST-DM, needs to be known to the clients; in order to add a level of secrecy, only L out of Md projections will be quantized to embed the watermark, where the L directions are kept secret to the clients. Let us indicate by A the indexes corresponding to the L directions where the watermark will be introduced. To represent that only L out of Md projections are quantized we will resort to a M × L matrix SA denoting a partition of S obtained by picking the columns whose indexes are in A. To embed the watermark, it is chosen to use not just two quantizers, but a set of L dithered quantizers, shifted each by a factor θj with respect to a reference quantizer Q0() having a fixed step size Δ, so that, for j ∈ A Qj(x) = Q0(x) + θj . (5) Each dithered quantizer is used to quantize one of the L randomly chosen projections, so the marked components are where j ∈ A. The vector of watermarked features is then given by: The result of this operation is the sequence of watermarked content features yk identifying the k-th user. A. Quantization Index Modulation approach and Spread Transform Dither Modulation The ST-DM algorithm belongs to the wider class of Quantization Index Modulation (QIM) watermarking [5]. According to the QIM approach, watermark embedding is achieved through the quantization of the host feature vector x on the basis of a set of predefined quantizers, where the particular quantizer depends on the to-be-hidden message. In the case of ST-DM, the correlation between the host feature vector x and a reference spreading signal s is computed as In a forensic application, we can think that each k-th user can be identified by employing a different set of dithered quantizers, characterized by a dithering vector θk = {θk , j}j∈A. According to this approach, referring to equation (6), in yk it is possible to distinguish between a term present in all the watermarked copies of the content, the summation and a term identifying the single k-th user, i.e. the summation This correlation is then quantized by applying to it either a quantizer Q0, or a quantizer Q1, depending on the to-behidden bit, obtaining the quantized correlation rw. The watermarked features are then: y = x + (rw − rx)s (4) To recover the embedded bit, a minimum distance decoder applied to the correlation r’ of the watermarked and possibly attacked features ˜y with the vector s is adopted. The ST-DM approach can be extended in such a way that the host features are projected not only along one direction, but on a vector subspace, allowing to introduce an additional degree of freedom in the design of the scheme. III. ST-DM SECURE EMBEDDING ISSN:2231-5381 The detector will thus try to identify a dishonest client by looking at this uniquely distinguishing component. A. ST-DM client side embedding Let us now describe how we implement a ST-DM based secure client side embedding. A distribution server, like in [4] generates an encryption look-up table E, whose entries are i.i.d. random variables following a Gaussian distribution N(0, σE); moreover, for each client, a personalized watermark LUT Wk is generated, according to N(0, σW), and a decryption LUT Dk is computed by combining component-wise E and Wk. In addition, let us suppose that the projection matrix S has been generated. The personalized LUTs and the matrix S are then transmitted once to each client over a secure channel. The server encrypts a content x of size M by adding to it some entries of E; however, differently from Eq. (2), here R -98- IJETT International Journal of Engineering Trends and Technology- May to June Issue 2011 entries are added along each of the Md orthogonal directions sj. In addition, in L randomly chosen directions the common terms approach based on a correlation statistic, followed by a maximum detector. Namely, the detector computes a vector of quantization errors as present in the embedding rule are introduced, so that at the server side the host features will be modified as in the following: and the detector statistics for the k-th client is defined as: The decision is made according to the following test: Decryption and watermark embedding is driven by the session key sk needed to reconstruct the sequence of indices tjh and add Md・R entries of the decryption LUT Dk to each encrypted feature ci: ,then: The output of the test is either the index k of the guilty client or the special symbol k = ∅ meaning that no watermark has been found on the examined content. The threshold γ has to be set so as to minimize the probability of detection errors. To do so, we formulate the problem as a binary hypothesis testing where the hypotheses If we assume it is possible to set are: H0, the content is not watermarked; Hk∗, the content , the result of this operation is the sequence of watermarked features yk, using the dithered quantizers shifted by the set θk = {θk,j}j∈A identifying the k-th user. The joint decryption and watermarking process then becomes: The final effect of the joint decryption and watermarking, is that a ST-DM watermark has been embedded in L directions, but in (Md −L) directions a spread spectrum like noise has been added. These noise terms can not be avoided, since the client is not allowed to know the L out of Md directions, indicated by the set A. IV. DETECTION It is assumed that the input to the detector is a vector of possibly altered watermarked features, denoted as ˜y. Such a vector is projected onto the L directions carrying the watermark, yielding a vector of L watermarked projections: Since the embedding rule makes it difficult to define a likelihood ratio, the proposed detector relies on a suboptimal ISSN:2231-5381 contains the watermark of the k ∗-th client. The detector makes an error every time it accuses a client and no watermark was present (false alarm) or it fails in detecting the watermark of the k∗-th client because it decides that no watermark is present (missed detection) or it wrongly accuses an innocent client (wrong accusation). The performance of the detector is then measured by the probability of false alarm Pf , the probability of missed detection Pm, and the probability of wrong accusation Pw: Hence, the probability of correct detection should be expressed as Pd = 1 − Pm − Pw. The above error probabilities will depend on the threshold γ and on several other parameters of the system, and will allow to measure the performance of the proposed system. V. PERFORMANCE EVALUATION The system embeds a watermark into a gray level image by modifying m out of 64 block DCT coefficients. In particular, for each 8×8 block, the DCT coefficients are reordered in the zig-zag scan, and the ones from the second until the (m+1)th are selected. Since the host features have variable size, whereas the spreading vector has a fixed size (i.e. M), we -99- IJETT International Journal of Engineering Trends and Technology- May to June Issue 2011 divide the vector of available host features into chunks of length M: each chunk is composed by the DCT coefficients belonging to l blocks, so that the length of each chunk is M = l ∙ m. If the number of 8 × 8 blocks inside an image is NB, the number of available chunks NC is given by: NC = (m · NB) /M. For each chunk the same projection matrix is adopted, but different sets of dithering θj are considered. According to this, the k-th client is identified by a vector obtained as the concatenation of NC vectors θik of length L (one for each chunk), that is in detection the vector having size L・ NC = L(m·NB)/M will be used. The performance analysis is carried out by defining the operating conditions in terms of Document to Watermark Ratio (DWR). The DWR expresses the ratio between the power of the host features and that of the watermark: where (MD/M)(m/64) and (L/M)(m/64)represent the percentages of DCT coefficients suffering the quantization error introduced by the embedding process, due to the shift addition process (involving all the MD directions) and to the quantization process (involving only L directions) respectively. In order to force a given DWR value for a specific watermarked image, we introduce a parameter α controlling the watermark strength and we put it as a factor multiplying the watermark LUT; specifically, we will consider αE[tjh] and αDk[tjh] instead of E[tjh] and Dk[tjh] in equations (7) and (8), and consequently also the watermark LUT will result multiplied by α. Since this parameter is required in decryption, the server will need to send the adopted α value to all the clients. The relationship between α and the DWR can be computed by taking into account that to assure that the shift value θ remains inside the interval [−Δ/2,+Δ/2], and given that θ follows a Gaussian distribution, the standard deviation σθ of the shifts θ has to be chosen in such a way that σθ = Δ/8 . Furthermore, since a shift value is obtained by the addition of R entries of the LUT Wk, we have that σθ2= Rα2σW2. By considering that Δ2 = 64σθ2, equation (18) can thus be rewritten as: In order to compare the performances of the proposed STDM client-side watermarking system vs. the SS version, we implemented the two systems considering the following values for the system parameters: M = 32, L = 4, m = 4, MD = 32, R = 4, σE = 100, σW = 0.01, T = 216, DWR = 36 dB. Parameters α, Δ and σθ have then been derived from the fixed ones, while σx and NB are estimated from the testing image (512 × 512 8-bit grey level images were considered). The Pf has been set to 10 −3. ST-DM shows a vanishing probability of missed detection at high WNR/JPEG quality and performs better than SS when the degradation on the watermarked content is kept within an acceptable range. VI. CONCLUSIONS The proposed client-side ST-DM embedding has been compared with a previously proposed client-side SS watermarking system, showing that the advantages of the informed embedding technique, which are well known in traditional watermarking systems, are preserved in the clientside scenario. This is not an obvious result, since the clientside framework imposes some constraints that do not allow us to embed a pure ST-DM watermark. Client side watermark embedding schemes have been proposed as a possible solution for the copyright protection in large scale content distribution environments. In this framework, we propose a lookup- table based secure embedding system, designed for the Spread Transform Dither Modulation (ST-DM) watermarking algorithm, that outperforms Spread Spectrum based systems. From the point of view of the compression overhead, in the current system, the server distributes encrypted images that cannot be optimally compressed; to cope with it, two possible solutions are devised: in the first one, suitable for the distribution of very large contents like videos, the server selectively encrypts only some parts of the content, which are not compressed; in the second one, the server employs some form of distributed source coding, that, at least in theory, should guarantee a coding rate close to the entropy of the watermarked content. However, it has to be considered that already in the current system the overhead due to encryption is balanced by the possibility of broadcasting the encrypted content: if the number of clients is much greater than the best achievable compression rate, transmitting separate optimally compressed copies of the content to each client will consume more bandwidth than broadcasting a single but less compressed copy. and therefore by imposing a given watermark distortion (i.e. a given DWR), a proper value for α is achieved. ISSN:2231-5381 -100- IJETT International Journal of Engineering Trends and Technology- May to June Issue 2011 REFERENCES [1] M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, “Lookup table based secure client-side embedding for spreadspectrum watermarks,” IEEE Trans. Inf. Forensics Security, vol. 3, no. 3, pp.475– 487,Sep. 2008. [2] R. J. Anderson and C. Manifavas, “Chameleon—A new kind of stream cipher,” in Proc. 4th Int. Workshop on Fast Software Encryption (FSE ’97), London, U.K., 1997, pp. 107–113. [3] A. Adelsbach, U. Huber, and A.-R. Sadeghi, “Fingercasting—Joint fingerprinting and decryption of broadcast messages,” in Proc. 11th Australasian Conf. Information Security and Privacy, 2006, vol. 4058, Lecture Notes in Computer Science, pp. 136–147. [4] M. Celik, A. Lemma, S. Katzenbeisser, and M. van der Veen, “Secure embedding of spread-spectrum watermarks using lookup tables,” in Proc. Int. Conf. Acoustics, Speech and Signal Processing (ICASSP’07), Honolulu, HI, Apr. 2007, vol. 2, pp. II-153–II-156. [5] I. J. Cox, M. L. Miller, and A. L. McKellips, “Watermarking as Communications with side information,” Proc. IEEE, vol. 87, no. 7, pp. 1127–1141, Jul. 1999s. ISSN:2231-5381 -101- IJETT