White Paper: Digital watermarking

Feature

White Paper: Digital watermarking

A digital watermark is an identification code, permanently embedded into digital data, carrying information on copyright protection and data authentication

The enormous popularity of the World Wide Web in the early 1990s demonstrated the commercial potential of offering multimedia resources through the digital networks. Since commercial interests seek to use the digital networks to offer digital media for profit, they have a strong interest in protecting their ownership rights. Digital watermarking has been proposed as one way to accomplish this.

A digital watermark is a digital signal or pattern inserted into a digital image. Since this signal or pattern is present in each unaltered copy of the original image, the digital watermark may also serve as a digital signature for the copies. A given watermark may be unique to each copy (e.g. to identify the intended recipient), or be common to multiple copies (e.g. to identify the document source). In either case, the watermarking of the document involves the transformation of the original into another form. This distinguishes digital watermarking from digital fingerprinting where the original file remains intact, but another file is created that "describes" the original file's content. For example, the checksum field for a disk sector would be a fingerprint of the preceding block of data. Similarly, hash algorithms produce fingerprint files.

Digital watermarking can also be contrasted with public-key encryption, which also transforms original files into another form. It is a common practice nowadays to encrypt digital documents so that they become unviewable without the decryption key. Unlike encryption, however, digital watermarking leaves the original image or file basically intact and recognisable. In addition, digital watermarks, as signatures, may not be validated without special software. Further, decrypted documents are free of any residual effects of encryption, whereas digital watermarks are designed to be persistent in viewing, printing, or subsequent re-transmission or dissemination.

The purpose of digital watermarks

The two types of digital watermarks are distinguished by their visibility to the casual viewer. Visible watermarks are used in much the same way as their bond paper ancestors, whereby the opacity of paper is altered by physically stamping it with an identifying pattern. This is done to mark the paper manufacturer or paper type. One might view digitally watermarked documents and images as digitally "stamped".

Invisible watermarks, on the other hand, are potentially useful as a means of identifying the source, author, creator, owner, distributor or authorised consumer of a document or image. For this purpose, the objective is to permanently and unalterably mark the image so that the credit or assignment is beyond dispute. In the event of illicit usage, the watermark would facilitate the claim of ownership, the receipt of copyright revenues, or the success of prosecution.

Watermarking has also been proposed to trace images in the event of their illicit redistribution. Whereas past infringement with copyrighted documents was often limited by the unfeasibility of large-scale photocopying and distribution, modern digital networks make large-scale dissemination simple and inexpensive. Digital watermarking makes it possible to uniquely mark each image for every buyer. If that buyer then makes an illicit copy, the illicit duplication may be convincingly demonstrated.

Visible versus invisible watermarks

Visible and invisible watermarks both serve to deter theft but they do so in very different ways. Visible watermarks are especially useful for conveying an immediate claim of ownership. The main advantage of visible watermarks, in principle at least, is that they virtually eliminate the commercial value of the document to a would-be thief without lessening the document's utility for legitimate, authorised purposes. A familiar example of a visible watermark is in the video domain where CNN and other television networks place their translucent logo at the bottom right of the screen image.

Invisible watermarks, on the other hand, are more of an aid in catching the thief than discouraging the theft in the first place.

Requirements of watermarks

To be effective in the protection of the ownership of intellectual property, the invisibly watermarked document should satisfy several criteria:

The watermark must be difficult or impossible to remove, at least without visibly degrading the original image

The watermark must survive image modifications that are common to typical image-processing applications (e.g. scaling, colour requantisation, dithering, cropping and image compression)

An invisible watermark should be imperceptible so that the view of the image is unaffected

For some invisible watermarking applications, watermarks should be readily detectable by the proper authorities, even if imperceptible to the average observer. Such decodability without requiring the original, un-watermarked image would be necessary for efficient recovery of property and subsequent prosecution.

One can understand the challenge of researchers in this field since the above requirements are stringent and sometimes clash with one another. The litmus test of a watermarking method would be that it is accepted and used on a large, commercial scale, and that it stands up in a court of law. None of the digital techniques have yet to meet these tests.

Techniques for watermarking

Watermarking techniques tend to divide into two categories, text and image, according to the type of document to be watermarked.

Several different methods enable watermarking in the spatial domain. The simplest (too simple for many applications) is to just flip the lowest-order bit of chosen pixels in a grey scale or colour image. This will work well only if the image is subjected to any human or noisy modification. A more robust watermark can be embedded in an image in the same way that a watermark is added to paper. Such techniques may superimpose a watermark symbol over an area of the picture and then add some fixed intensity value for the watermark to the varied pixel values of the image. The resulting watermark may be visible or invisible depending upon the value (large or small, respectively) of the watermark intensity. One disadvantage of spatial domain watermarks is that picture cropping (a common operation of image editors) can be used to eliminate the watermark.

Spatial watermarking can also be applied using colour separation. In this way, the watermark appears in only one of the colour bands. This renders the watermark visibly subtle so that it is difficult to detect under regular viewing. However, the watermark appears immediately when the colours are separated for printing or xerography. This renders the document useless to the printer unless the watermark can be removed from the colour band. This approach is used commercially for journalists to inspect digital pictures from a photo-stockhouse before buying non-watermarked versions.

Watermarking can be applied in the frequency domain (and other transform domains) by first applying a transform like the Fast Fourier Transform. In a similar manner to spatial domain watermarking, the values of chosen frequencies can be altered from the original. Since high frequencies will be lost by compression or scaling, the watermark signal is applied to lower frequencies, or better yet, applied adaptively to frequencies that contain important information of the original picture (feature-based schemes). Since watermarks applied to the frequency domain will be dispersed over the entirety of the spatial image upon inverse transformation, this method is not as susceptible to defeat by cropping as the spatial technique. However, there is more of a tradeoff here between invisibility and decodability, since the watermark is, in effect, applied indiscriminately across the spatial image.

Watermarking can be applied to text images as well. Three proposed methods are: text line coding, word space coding and character encoding. For text line coding, the text lines of a document page are shifted imperceptibly up or down. For a 40-line text page, for instance, this yields 2**40 possible codewords. For word-shift coding, the spacing between words in a line of justified text is altered. For character coding, a feature such as the endline at the top of a letter "t" is imperceptibly extended. An advantage of these methods over those of picture images is that, by combining two or three of these to one document, two documents with different watermarks cannot be spatially registered to extract the watermark. Of course, the watermark can be defeated by retyping the text.

Limitations of digital watermarking

As of this writing, a counterfeiting scheme has been demonstrated for a class of invertible, feature-based, frequency domain, invisible watermarking algorithms. This counterfeiting scheme could be used to subvert ownership claims because the recovery of the digital signature from a watermarked image requires a comparison with an original. The counterfeiting scheme works by first creating a counterfeit watermarked copy from the genuine watermarked copy by effectively inverting the genuine watermark. This inversion creates a counterfeit of the original image that satisfies two properties:

A comparison of the decoded versions of both the original and counterfeit original yields the owner's (authorised) signature

A comparison of decoded versions of both the original and counterfeit original yield the forged (inverted) signature

This, the technique of establishing legitimate ownership recovering the signature watermark by comparing a watermarked image with the original image, breaks down. It can be shown that both the legitimate signature and counterfeiter's signature in here in both the watermarked and counterfeit watermarked copies. Thus, while it may be demonstrated that at least one recipient has a counterfeit watermarked copy, it can not be determined which one it is.

This research suggests that not all watermarking techniques will be useful in resolving ownership disputes in courts of law. There are likely to be non-commercial applications, or those with limited vulnerability to theft, where "good enough watermarking" will suffice. More sensitive applications may require non-invertable or non-extracting watermarking techniques. These issues are under consideration at the time of writing.

The future of watermarking

Though publishers have been clamoring for some means to protect their material on electronic networks, there has been no rush yet to embrace any of the current schemes. This could be just due to a period of inspection and appraisal, but our opinion is that publishers and scientists have yet to fully understand the practical specifications associated with the problem. Should the watermarks be visible or invisible? What constitutes invisibility? How difficult should it be to remove watermarks from images? How might one characterise "good-enough watermarking" for different commercial and non-commercial applications? What constitutes a "reasonable" level of photo-editing? Or, of degradation? Can the original image be required for decoding? Is transferal of the watermark from the electronic medium to the printed medium important? How are the watermarks to be policed?

As scientists propose solutions and publishers experiment with them and debate their merits, some methods of watermarking will emerge as useful and be widely used. When that happens, there will also be the emergence of external agencies for monitoring electronic copyright infringement (much the same as there are agencies for music and print copyright management). In the meantime, the challenge is for the scientists to develop ever more invisible, decodable and permanent watermarking methods, and perhaps to meet even more specifications as they are demanded.

( 1998 Hal Berghel

Compiled by Arlene Martin


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

This was first published in October 1999

 

COMMENTS powered by Disqus  //  Commenting policy