On comparative analysis of two formation schemes of digital watermarks

Author(s):  
Д.А. Мансурова ◽  
В.В. Мкртичян

Многопользовательские схемы цифровых водяных знаков (ЦВЗ) предназначены для защиты авторских прав на цифровую продукцию. В данной работе рассматриваются две схемы ЦВЗ Боне—Шоу: базовая и каскадная, проводятся исследование и сравнительный анализ этих схем с целью определения более эффективной схемы из двух по длине, а также указаны границы значений параметров схем, для которых одна схема эффективнее другой. Multiuser digital watermarking is a powerful tool for copyright protection of widely replicable digital products. This paper addresses Boneh—Shaw fingerprinting schemes. The algorithms proposed by D. Boneh and J. Shaw allow a distributor to detect any unauthorized copy and trace it back to user and they work correctly for any size of coalition. The main idea of this paper is a comparative analysis of two Boneh—Shaw digital watermarks schemes (cascade and basics), which makes clear which one of these schemes is more effective in terms of the length of the label. Using the comparative analysis and numerical experiments, we obtain the specific values of the boundaries for input parameters in which one scheme will be more efficient than another. From the results of the comparative analysis it can be concluded that for large number of users of the scheme and a small size of the coalition (in relation of users number) it is advisable to use the cascade scheme. In the case of a small number of users and a large size of the coalition (compared to the number of users) it is more expedient to use the basic scheme.

Author(s):  
Kuanchin Chen

Sharing, disseminating, and presenting data in digital format is not just a fad, but it is becoming part of our life. Without careful planning, digitized resources could easily be misused, especially those that are shared across the Internet. Examples of such misuse include use without the owner’s permission, and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of copyright protection technique, such as digital watermarks. Digital watermarks refer to the data embedded into a digital source (e.g., images, text, audio, or video recording). They are similar to watermarks in printed materials as a message inserted into the host media typically becomes an integral part of the media. Apart from traditional watermarks in printed forms, digital watermarks may also be invisible, may be in the forms other than graphics, and may be digitally removed.


Author(s):  
Tino Jahnke ◽  
Juergen Seitz

In order to solve intellectual property problems of the digital age, two basic procedures are used: “Buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of non-natural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. Digital watermarking is described as a possibility to interface and close the gap between copyright and digital distribution. It is based on steganographic techniques and enables useful right protection mechanisms. Digital watermarks are mostly inserted as a plain bit sample or a transformed digital signal into the source data using a key based embedding algorithm and a pseudo-noise pattern. The embedded information is hidden in low-value bits or least significant bits of picture pixels, frequency or other value domains, and linked inseparably with the source of the data structure. For the optimal application of watermarking technology a trade-off has to be made between competing criteria like robustness, non-perceptibility, non-delectability, and security. Most watermarking algorithms are resistant against selected and application-specific attacks. Therefore, even friendly attacks in the form of usual file and data modifications can destroy easily the watermark or falsify it. This chapter gives an overview in watermarking technologies, classification, methodology, applications and problems.


Author(s):  
Tino Jahnke ◽  
Juergen Seitz

In order to solve intellectual property problems of the digital age, two basic procedures are used: “Buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of non-natural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. Digital watermarking is described as a possibility to interface and close the gap between copyright and digital distribution. It is based on steganographic techniques and enables useful right protection mechanisms. Digital watermarks are mostly inserted as a plain bit sample or a transformed digital signal into the source data using a key based embedding algorithm and a pseudo-noise pattern. The embedded information is hidden in low-value bits or least significant bits of picture pixels, frequency or other value domains, and linked inseparably with the source of the data structure. For the optimal application of watermarking technology a trade-off has to be made between competing criteria like robustness, non-perceptibility, non-delectability, and security. Most watermarking algorithms are resistant against selected and application-specific attacks. Therefore, even friendly attacks in the form of usual file and data modifications can destroy easily the watermark or falsify it. This chapter gives an overview in watermarking technologies, classification, methodology, applications and problems.


Author(s):  
Lakshman Ji Et. al.

In this research paper, we concerned with the creation of a comprehensive digital watermarking framework based on DWT. In order to improve imperceptibility and robustness, the watermark is inserted only in chosen frames. The picked frames are the frames in which a change of scene happens. The key objective, therefore, is to detect the correct transformation of the scene. The Scene Shift Detector identifies correct frames that have been modified using the successive histogram discrepancy process. Two schemes proposed using the same method of scene detection. Both suggested schemes achieve a good watermark rating with good (PSNR) valuesThere, Because the watermark integration is done exclusively on the scene with low and high frequency DWT subbands, the image processing assaults, geometric aggressions, JPEG compression, high normalised image attacks are immune,and low-bit error rates (BER). Comparative analysis of two algorithms is also carried out.


2018 ◽  
Vol 2018 ◽  
pp. 1-22 ◽  
Author(s):  
Milad Taleby Ahvanooey ◽  
Qianmu Li ◽  
Hiuk Jae Shim ◽  
Yanyan Huang

With the ceaseless usage of web and other online services, it has turned out that copying, sharing, and transmitting digital media over the Internet are amazingly simple. Since the text is one of the main available data sources and most widely used digital media on the Internet, the significant part of websites, books, articles, daily papers, and so on is just the plain text. Therefore, copyrights protection of plain texts is still a remaining issue that must be improved in order to provide proof of ownership and obtain the desired accuracy. During the last decade, digital watermarking and steganography techniques have been used as alternatives to prevent tampering, distortion, and media forgery and also to protect both copyright and authentication. This paper presents a comparative analysis of information hiding techniques, especially on those ones which are focused on modifying the structure and content of digital texts. Herein, various text watermarking and text steganography techniques characteristics are highlighted along with their applications. In addition, various types of attacks are described and their effects are analyzed in order to highlight the advantages and weaknesses of current techniques. Finally, some guidelines and directions are suggested for future works.


10.28945/2626 ◽  
2003 ◽  
Author(s):  
Supot Nitsuwat ◽  
J. Srisomphun

Computer-based instruction assistance (CAI) plays very important role in e-leaming system. Distancelearning students can remotely access this kind of course materials. However, being an electronic form has created a growing need to protect them against illegal manipulation and duplication. Therefore, the more robust techniques are needed. Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia for many decades. This technique can also be applied to the educational frameworks. In this paper, before the CAI will be distributed, double watermarks have been embedded into all still images in the CAI materials. Firstly, the visible watermark, e.g., university’s logo, is inserted directly on image pixel’s intensity to exhibit an ownership of the CAI. The fragile invisible watermark is then embedded again on these watermarked images. Because of the special characteristic of the latter if there is any attempt to change or remove the visible logo, it can be clearly detected. We also proposed the extracting method to reveal secret information using for verifying our right on the materials. The experiments using different kinds of attacks on the materials are also conducted. Finally, the discussion of the experimental results and conclusion of the paper are also given.


2013 ◽  
Vol 321-324 ◽  
pp. 2609-2612
Author(s):  
Yan Liang ◽  
Gao Yan ◽  
Chun Xia Qi

Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia data in a networked environment. It makes possible to tightly associated to a digital document a code allowing the identification of the data creator, owner, authorized consumer, and so on. In this paper a new DCT-domain system for digital watermarking algorithm for digital images is presented: the method, which operates in the frequency domain, embeds a pseudo-random sequence of scrambled image in a selected set of DCT coefficients. After embedding, the watermark is adapted to the image by exploiting the masking characteristics of the human visual system, thus ensuring the watermark invisibility. By exploiting the statistical properties of the embedded sequence, the mark can be reliably extracted without resorting to the original uncorrupted image. Experimental results demonstrate that the watermark is robust to several signal processing techniques, including JPEG compression, cut, fuzzy, addition of noise, and sharpen.


Author(s):  
Hiroaki Date ◽  
Satoshi Kanai ◽  
Takeshi Kishinami

Abstract Recently, much interest is being taken in a method to protect the copyright of digital data and prevent illegal duplication of it. However, in the area of CAD/CAM and CG, there are no effective ways to protect the copyright of the 3D geometric models. As a first step to solve this problem, a new digital watermarking method for 3D polygonal models is introduced in this paper. Watermarking is one of the copyright protection methods where an invisible watermark is secretly embedded into the original data. The proposed watermarking method is based on the wavelet transform (WT) and multi-resolution representation (MRR) of the polygonal model. The watermark can be embedded in the large wavelet coefficient vectors at various resolution levels of the MRR. This makes the embedded watermark imperceptible and invariant to the affine transformation, and also makes the control of the geometric error caused by the watermarking reliable.


2021 ◽  
pp. 1-15
Author(s):  
L. L. Bosova ◽  
A. Yu. Bosova ◽  
V. I. Filippov

The article substantiates the relevance of early teaching in programming and describes a possible variant of such work with students in grades 3–6 as part of the course of extracurricular activities of general intellectual orientation. The potential of the course in achieving personal, metasubject and subject results by students is revealed. Thematic planning and content of teaching younger schoolchildren in the Scratch programming environment are presented. The main idea of the methodology for conducting extracurricular activities with junior schoolchildren is stated: working with ready-made examples according to the "use - change - addition - creation" scheme, which allows students to create digital products (multimedia postcards, interactive posters, games, simulators and quizzes).


2007 ◽  
Vol 26 (4) ◽  
pp. 319-330 ◽  
Author(s):  
Ming-Chiang Hu ◽  
Der-Chyuan Lou ◽  
Ming-Chang Chang

Sign in / Sign up

Export Citation Format

Share Document