Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang Survey of Digital Watermarking Technology Watermarking is best known for official company letterheads or a hundred dollar bill. However, in today’s world of advanced technology, protecting copyrighted works gained a new urgency. Since the exponential rise of the Internet in the early 1990’s, illegal distribution of copyrighted material has followed the exponential rise. It is estimated that by 2005, book publishers and record label companies will lose 4.6 billion dollars a year (Forrester Research). This paper will focus on three main issues. First, the paper will disclose the reason why digital watermarking has become so important. Second, the paper will focus on different technical approaches to watermarking technology and describe different techniques. Finally, commercial applications and new research will be discussed in order to gain understanding of what the future holds. In order to proceed, some basic terms need to be defined. A watermark in its basic form is extra data that is inserted into a medium such as an image or audio file. A robust watermark is one that could withstand malicious or accidental attacks, such as cropping, scaling, file conversion/compression, printing, and rotation. A fragile watermark, on the other hand, is one that is destroyed once any changes to the document occur. Under ideal circumstances, a robust watermark would also pinpoint exact pixels that have been tampered with. When working with images, watermarking can be implemented using the spatial or frequency domain. Several techniques for the procedure exist, to use in both domains, such as color separation in the spatial domain, and Fast Fourier Transform in the Page 1 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang frequency domain. Watermarking using these methods, as well as other schemes, will be discussed in detail. A simple watermarking algorithm uses metatags to embed secret code in the header of the file. However, this technique is very fragile, as any type of file conversion is likely to remove the watermark. Another simple technique takes advantage of the Contrast Sensitivity Function (CSF). CSF is an index characterizing how well the human could see at different frequencies. Particularly it shows that at high frequencies the eye is very insensitive to change. Therefore, encompassing a watermark in high frequency will make it transparent to the human eye. Unfortunately, a simple low pass filter will remove the watermark. Watermarking research has yielded algorithms, not only for use with ordinary images, but with text as well. Though fragile, three proposed methods are text line coding, word space coding, and character encoding. These methods depend on the spacing between the lines of a text, spacing between words, and spacing between characters. While some techniques are more fragile (watermark is easily removed) than others, the purposes, potential use and security issues regarding each technique made its way into our research, and will be discussed in full detail. Page 2 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang A superior watermarking method has been developed by Kodak. Either a logo or a bitstream could be embedded in any image or movie. The bitstream is embedded using positive or negative Dirac Delta function. (x,y)= C(x,y)C(x,y), where is defined as cyclic correlation. In other words, the formula above is equivalent to multiplying the magnitudes of two signals, while subtracting their phases in the Fourier domain. The process is designed to split the image into M x N blocks. A secret key is used to generate a ‘random’ phase that resembles noise. The ‘noise’ and watermark are convolved and scaled to a small amplitude. This result is then added to each block of the original image. Because it resembles noise, the key cannot be easily intercepted in the image. Mathematically, the process is I’(x,y)= (M(x,y)*C(x,y))+I(x,y), where Page 3 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang * is cyclic convolution, I(x,y) is original image, I’(x,y) is the image embedded with a watermark, M(x,y) is the message image, C(x,y) is the carrier image, and is arbitrary constant to make image invisible and robust The reverse is performed when extracting the watermark. The image is broken up into M x N pieces and all the pieces are added together to cancel the effects of possible noise. As a separate process, the same ‘random’ noise is generated using the same key. The noise is then correlated with the sum of all blocks. If the correct key has been used, the original watermark will appear. The image below, courtesy of Kodak, demonstrates the process. Courtesy of Kodak This same technology could be applied to the digital movie industry. An invisible watermark could be embedded into the frames of a movie, containing theatre and distributor information. If a pirated copy should fall into the hands of law enforcement officials, the watermark could be extracted and used to prosecute the responsible parties. Page 4 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang Kodak has demonstrated an accuracy of over 99.9%, given 23 or more frames which are watermarked (half a second). Another method has been proposed by Wong and Memon, both of whom are professors at Polytechnic University. In fact, Wong and Memon have two variants to their method. The first includes a secret key, and the second a public key. In the secret key scheme, only two people have the key, the owner and the verifier. The key must be passed along with the image, but on a different, yet secure channel. While this greatly increases security, it is not always desirable. For instance, if an organization wants to broadcast copyrighted material, having a secret decryption key would negate the purpose. The public key resolves the problem by allowing anyone to verify the authenticity of the document, while only one person is able to embed the watermark into the content. Regardless of whichever method is used, the image must be grayscale. Otherwise, the watermarking process has to be applied to each color plane separately (i.e., R, G, B). The image is divided into N x M blocks where Xr denotes the rth block. First, all LSBs are set to 0. The user key along with the LSBs and other parameters are used to create a hash function output. In a good hash function, given x and y, where x is not equal to y, h(x) will never equal h(y). Once the hash output has been calculated it is XORed with the watermark to receive signals Cr. Cr is the inserted into the LSBs to make the final image. Since only LSBs have been modified, no significant degradation is visible. The figures below, courtesy of Wong and Memon, show embedding and extracting algorithms. Page 5 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang The remaining work for this paper consists of obtaining various commercial uses of watermarking technology, and how such technology would be implemented in a commercial environment. Suffice it to say, questions regarding the usefulness of such technology will be addressed. Page 6 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang New research has yet to be considered to see where digital watermarking is going. However, it is evident that the field contains much promise, and is undergoing active research. Possible uses of such technology include proof of occurrence, when a picture has been modified using software such as Adobe Photoshop, the watermark will reveal which part of the photograph has been tampered with. Another application currently under development is duplication control. In such an application, additional hardware is added to devices such as DVD players, where a watermark is read and modified each time the media is copied. After a pre-programmed number of copies, the hardware will not allow the creation of duplicates. Just as importantly, a watermark could be inserted into a photo ID or a passport, where the watermark would contain an index to the national database. Each time the passport is scanned, the national database will be contacted to validate the passport. Such system would make fake photo IDs almost impossible. Page 7 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang Sources Digimarc is a commercial provider of watermarking technologies. The site offers many solutions for modern business. http://www.digimarc.com/watermarking/default.asp “Digital Watermarking” by R. Chandramouli, Dept. of ECE, Stevens Institute of Tecnology, Nasir Memon, Dept. of CS, Polytechnic University, and Majid Rabbani, Imaging Research & Advanced Development, Eastman Kodak Co. http://isis.poly.edu/memon/pdf/3.pdf “Data Embedding Using Phase Dispersion” by Chris Honsinger and Majid Rabbani, Copyright 2000, Eastman Kodak Co. “Secret and Public Key Imgae Watermarking Schemes for Image Authentication and Ownership Verificaiton” by Ping Wah Wong, and Nasir Memon, IEEE June 29, 1999. Cannon has developed an error correcting approach, and is planning to improve it further. http://www.canon.com/technology/system/digital_watermark/content.html ACM article describing different approaches and watermarking techniques. http://www1.acm.org:82/~hlb/publications/dw_n/dw_n.html Paper published by two German researchers regarding a new watermarking technique. http://syscop.igd.fhg.de/Publications/Roth02a.pdf Page 8 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang ----------http://www.digimarc.com/watermarking/default.asp WHAT IS DIGITAL WATERMARKING? Digimarc's digital watermarking technologies allow users to embed in audio, images, video and printed documents a digital code that is imperceptible during normal use but readable by computers and software. The science of creating these imperceptible codes is known as digital watermarking. Digimarc is a leading owner of intellectual property relating to digital watermarks and a pioneer in the commercial application of this technology. copyright communication and tracking of digital images Digimarc ImageBridge watermarking Digimarc Excalibur Copy Detection counterfeit detection of ID cards and packaging Digimarc Excalibur Secure Authentication authentication and linking of packaging and documents Digimarc MediaBridge technology linking of packaging, tags and labels ----------http://www.businessweek.com/1997/35/b3542095.htm ----------Performance In general, the performance of a data embedding algorithm is a tradeoff between three factors: 1. Data capacity (number of embedded bits) 2. Visibility of the embedded message 3. Robustness (ability to withstand image-processing tasks) Commonly, performance of a digital watermarking technology is evaluated by keeping (1) and (2) constant, and then measuring the message survival rate when the picture is subjected to varying degrees of image manipulation and degradation. http://www.kodak.com/US/en/corp/researchDevelopment/technologyFeatures/aboutDW.s html --------http://syscop.igd.fhg.de/Publications/Roth02a.pdf --------Data for still pictures is frequency-converted using Fourier conversion, where the converted data is manipulated according to the key information- embedding location and strength-and pulse signals are inserted for the inverse Fourier conversion that restores the picture data. The inserted pulse signals for different pieces of information are Page 9 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang dispersed throughout the picture during the inverse conversion process and retained in an invisible state in the picture data, forming a digital watermark. Canon's New Technologies Using Error-Correction Encoding Digital watermarking is one form of security technology to ensure copyright protection. This technology provides a high level of safety, because the location of embedded information is secret, and neither the watermark algorithm nor the location of embedding is made public. Although effective when used within one organization, the secrecy required for this method is a hindrance when several users are involved, or when standardization is desired. Working under the premise that making both algorithms for protecting image copyrights and embedding locations public would enable many people to use the technology for copyright protection, Canon developed its own error-correction encoding technology. This method uses mathematical processing to restore signals that are difficult to distinguish from noise to their original state. With this technology, the data in picture and voice contents that contain embedded watermark information is processed as a whole to correct errors. It is possible to restore embedded information in the contents by dispersing and embedding the watermark information and subjecting the entire contents to the error-correction encoding process. This works even if the information has been erased or illegally rewritten. This new technology, developed by attacking the problem from a different angle, protects copyright holders and purchases by preventing embedded data from being illegally rewritten. The software that reads the watermark is commercially available to facilitate the detection of illegal activity. In addition to the aforementioned method of protecting image copyrights, Canon is developing digital watermark using wavelet conversion adopted for JPEG 2000, as well as other digital watermark including those for high-quality printing. http://www.canon.com/technology/system/digital_watermark/content.html ------------Techniques, applications, links, etc http://www1.acm.org:82/~hlb/publications/dw_n/dw_n.html -----Despite claims that digital watermarks can survive image alteration and cannot be stripped without seriously affecting image quality, a recent CyberTimes report revealed that the digital watermarks on some images "may have been weakened or [may have] disappeared by the time the images were processed for the Internet." Resizing, compressing and converting images from one file type to another may add noise to an image or diminish its watermark in such a manner that the watermark becomes unreadable. Further, even when a digital watermark remains intact, tracking services are of limited use to copyright owners in searching for illegal copies of their works on the Internet when such copies are within sites protected by passwords. http://www.webreference.com/content/watermarks/tracking.html ------An international meeting point for scientists, researchers and companies active in digital watermarking. Why not add the copyright information into the file format? One could define a new audio file format, in which the watermark is a part of the header block but is not removable without destroying the original signal, because part of the definition of the file format requires the watermark to be therein. In this case the signal would not really be literally 'destroyed' but any application using this file format would not touch it without a valid watermark. Some electronic copyright management system propose mechanisms like this. Such Page 10 of 8 Mikhail Pomeranets Kathy Zaslavskaya Final Project Report EE3414 Prof. Yao Wang schemes are weak as anyone with a computer or a digital editing workstation would be able to convert the information to another format and remove the watermark at the same time. Finally this new audio format would be incompatible with the existing one. Thus the watermark should really be embedded in the audio signal. This is very similar to S.C.M.S. When Philips and Sony introduced the 'S/PDIF' (Sony/Phillips Digital Interchange Format), they included the S.C.M.S. (Serial Code Management System) which provides a way copies of digital music are regulated in the consumer market. This information is added to the stream of data that contains the music when one makes a digital copy (a 'clone'). This is in fact just a bit saying: digital copy prohibited or permitted. Some professional equipment are exempt for needing S.C.M.S. With watermarking however, the copy control information is part of the audiovisual signal and aim at surviving file format conversion and other transformations. http://www.watermarkingworld.org/ -------estimates of losses http://www.fasoo.com/eng/sub_news01read.html Page 11 of 8