A publicly verifiable lossless watermarking scheme for copyright protection and ownership assertion

2012 ◽  
Vol 66 (11) ◽  
pp. 955-962 ◽  
Author(s):  
Sanjay Rawat ◽  
Balasubramanian Raman
2017 ◽  
Vol 9 (2) ◽  
pp. 25-37 ◽  
Author(s):  
Juan Chen ◽  
Fei Peng ◽  
Jie Li ◽  
Min Long

With the wide application of 3D STL model in 3D printing, much attention has been paid to its content security and copyright protection. Based on entity rearrangement and bit mapping, a lossless and high capacity watermarking scheme is proposed for 3D STL model. Experimental results and analysis show that the average capacity is improved 0.71bits/facet compared with the original entity rearrangement method, and the capacity is 0.247 bits/entity larger than that of the optimal capacity of the standard entity rearrangement method. It can achieve good efficiency and it is robust against translation, rotation and even scaling. It has potential application in secret communication and copyright protection of 3D STL model.


2021 ◽  
Vol 1131 (1) ◽  
pp. 012020
Author(s):  
Neha Janu ◽  
Ankit Kumar ◽  
Pankaj Dadheech ◽  
Gajanand Sharma ◽  
Ashutosh Kumar ◽  
...  

2007 ◽  
Vol 26 (4) ◽  
pp. 319-330 ◽  
Author(s):  
Ming-Chiang Hu ◽  
Der-Chyuan Lou ◽  
Ming-Chang Chang

Author(s):  
Farook Sattar ◽  
Dan Yu

Today, the Internet is a worldwide broadcasting capability, a mechanism for information dissemination and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. With the rapid evolution of digital networks, digital libraries and World Wide Web (WWW) services, the convenient broadcasting or exposition of digital products on the global network leads easily to illegal copying, modifying and retransmission. The Internet has spawned many copyright issues involving multimedia content distribution. Let’s say an owner would like to sell or distribute a work to legal/registered users only. If the work were subsequently copied/redistributed illegally, how could the owner find who was responsible? Cryptographic techniques provide an effective solution for securing the delivery process and controlling the use of the contents that an user has obtained. However, with flawless transmission through the network, the contents after decryption are exactly the same as the original data. The contents can be copied perfectly infinite times. A user can also manipulate the contents. Digital watermarking (Arnold, Schmucker, & Wolthusen, 2003; Katzenbeisser & Petitcolas, 2000) offers a way to counter copyright piracy on global networks that are not solvable by cryptography. It provides proof and tracking capabilities to illegal copying and distribution of multimedia information. Most existing digital watermarking schemes are based on some assumptions for watermark detection and extraction. Some schemes require the previous knowledge of watermark locations, strengths or some thresholds. In some algorithms, the watermark is estimated with the help of the original watermark information. To ensure the robustness and invisibility of the watermark, the optimum embedding locations are usually different for different images. For a large image database, it could be a disadvantage to require watermark location and strength information for watermark detection and extraction. A large amount of information then needs to be stored. On the Internet, an owner would like to distribute multimedia data by signing different watermarks to different users in order to prevent illegal redistribution of the data by a legal user. In this scenario, watermark detection and extraction algorithms requiring information of either watermark embedding locations and strengths or the original watermark should fail, since one does not know exactly which watermark is embedded in a particular copy of the watermarked image. To this end, we present a new blind watermarking scheme (Yu, Sattar, & Ma, 2002; Yu & Sattar, 2003, 2005) based on Independent Component Analysis (ICA) (Hyvarinen, 1999; Hyvärinen & Oja, 1999; Lee, 1998) for color images, which can overcome existing problems of watermark detection and extraction as described above. The new ICA-based scheme is found to be efficient in the application of data tracking/tracing for multimedia distribution through the Internet against other digital watermarking schemes. By adopting this ICA-based watermarking scheme, an efficient multimedia distribution framework/protocol for copyright protection can be accomplished. This article is organized as follows: The watermark embedding and extraction algorithms for color image watermarking using the new ICA-based scheme are presented next, followed by a discussion and comments on the results, security issues, summary and future works.


Author(s):  
Josef Pieprzyk

Internet and its widespread usage for multimedia document distribution put the copyright issue in a complete new setting. Multimedia documents, specifically those installed on a web page, are no longer passive as they typically include active applets. Copyright protection safeguards the intellectual property (IP) of multimedia documents, which are either sold or distributed free of charge. In this Chapter, the basic tools for copyright protection are discussed. First, general concepts and the vocabulary used in copyright protection of multimedia documents are discussed. Later, taxonomy of watermarking and fingerprinting techniques are studied. This part is concluded by a review of the literature dealing with IP security. The main part of the chapter discusses the generic watermarking scheme and illustrates it on three specific examples: collusion-free watermarking, spread spectrum watermarking, and software fingerprinting. Future trends and conclusions close the chapter.


Sign in / Sign up

Export Citation Format

Share Document