scholarly journals Security in CAI Materials by Embedding Digital Watermarks

10.28945/2626 ◽  
2003 ◽  
Author(s):  
Supot Nitsuwat ◽  
J. Srisomphun

Computer-based instruction assistance (CAI) plays very important role in e-leaming system. Distancelearning students can remotely access this kind of course materials. However, being an electronic form has created a growing need to protect them against illegal manipulation and duplication. Therefore, the more robust techniques are needed. Digital watermarking has been proposed as a solution to the problem of copyright protection of multimedia for many decades. This technique can also be applied to the educational frameworks. In this paper, before the CAI will be distributed, double watermarks have been embedded into all still images in the CAI materials. Firstly, the visible watermark, e.g., university’s logo, is inserted directly on image pixel’s intensity to exhibit an ownership of the CAI. The fragile invisible watermark is then embedded again on these watermarked images. Because of the special characteristic of the latter if there is any attempt to change or remove the visible logo, it can be clearly detected. We also proposed the extracting method to reveal secret information using for verifying our right on the materials. The experiments using different kinds of attacks on the materials are also conducted. Finally, the discussion of the experimental results and conclusion of the paper are also given.

Author(s):  
Kuanchin Chen

Sharing, disseminating, and presenting data in digital format is not just a fad, but it is becoming part of our life. Without careful planning, digitized resources could easily be misused, especially those that are shared across the Internet. Examples of such misuse include use without the owner’s permission, and modification of a digitized resource to fake ownership. One way to prevent such behaviors is to employ some form of copyright protection technique, such as digital watermarks. Digital watermarks refer to the data embedded into a digital source (e.g., images, text, audio, or video recording). They are similar to watermarks in printed materials as a message inserted into the host media typically becomes an integral part of the media. Apart from traditional watermarks in printed forms, digital watermarks may also be invisible, may be in the forms other than graphics, and may be digitally removed.


Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Although the development of multimedia processing techniques has facilitated the enrichment of information content, and the never-ending expansion of interconnected networks has constructed a solid infrastructure for information exchanges, meanwhile, the infrastructure and techniques have also smoothed the way for copyright piracy in virtual communities. As a result, the demand for intellectual property protection becomes apparent and exigent. In response to this challenge, digital watermarking has been proposed to serve this purpose. The idea of digital watermarking is to embed a small amount of secret information—the watermark—into the host digital productions, such as image and audio, so that it can be extracted later for the purposes of copyright assertion, authentication and content integrity verification, and so forth. Unlike traditional watermarks printed on paper, which are visible to human eyes, digital watermarks are usually invisible and can only be detected with the aid of a specially designed detector. One characteristic distinguishing digital watermarking from cryptography, which separates the digital signature from the raw data/content, is that digital watermarking embeds the signature in the content to be protected. The superiority of this characteristic is that while cryptography provides no protection after the content is decrypted, digital watermarking provides “intimate” protection, because the digital signature/secret information has become an inseparable constituent part of the content itself after embedding. Because of the very characteristic, digital watermarking requires no secret channel for communicating the digital signature that cryptography does. So in the last decade, digital watermarking has attracted numerous attention from researchers and is regarded as a promising technique in the field of information security. Various types of watermarking schemes have been developed for different applications. According to their natures, digital watermarking schemes could be classified into three categories: fragile watermarking, semi-fragile watermarking and robust watermarking. The schemes of the first two categories are developed for the purposes of multimedia authentication and content integrity verification, in which we expect the embedded watermark to be destroyed when attacks are mounted on its host media. More emphases of these schemes are placed on the capability of detecting and localizing forgeries and impersonations. The main difference between the two is that semi-fragile watermarking is tolerant to non-malicious operations, such as lossy compression within a certain compression ratio, while fragile watermarking is intolerant to any manipulations. Robust watermarking, on the other hand, is intended for the applications of copyright protection, wherein the watermarks should survive attacks aiming at weakening or erasing them provided the quality of the attacked content is still worth protecting. Therefore, the emphasis of robust watermarking schemes is placed on their survivability against attacks. This article is intended to focus on robust watermarking schemes for the application of copyright protection. See Li and Yang (2003) and Lin and Chang (2001) for more details about fragile and semi-fragile schemes.


2008 ◽  
pp. 3788-3793
Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Although the development of multimedia processing techniques has facilitated the enrichment of information content, and the never-ending expansion of interconnected networks has constructed a solid infrastructure for information exchanges, meanwhile, the infrastructure and techniques have also smoothed the way for copyright piracy in virtual communities. As a result, the demand for intellectual property protection becomes apparent and exigent. In response to this challenge, digital watermarking has been proposed to serve this purpose. The idea of digital watermarking is to embed a small amount of secret information—the watermark—into the host digital productions, such as image and audio, so that it can be extracted later for the purposes of copyright assertion, authentication and content integrity verification, and so forth. Unlike traditional watermarks printed on paper, which are visible to human eyes, digital watermarks are usually invisible and can only be detected with the aid of a specially designed detector. One characteristic distinguishing digital watermarking from cryptography, which separates the digital signature from the raw data/content, is that digital watermarking embeds the signature in the content to be protected. The superiority of this characteristic is that while cryptography provides no protection after the content is decrypted, digital watermarking provides “intimate” protection, because the digital signature/secret information has become an inseparable constituent part of the content itself after embedding. Because of the very characteristic, digital watermarking requires no secret channel for communicating the digital signature that cryptography does. So in the last decade, digital watermarking has attracted numerous attention from researchers and is regarded as a promising technique in the field of information security. Various types of watermarking schemes have been developed for different applications. According to their natures, digital watermarking schemes could be classified into three categories: fragile watermarking, semi-fragile watermarking and robust watermarking. The schemes of the first two categories are developed for the purposes of multimedia authentication and content integrity verification, in which we expect the embedded watermark to be destroyed when attacks are mounted on its host media. More emphases of these schemes are placed on the capability of detecting and localizing forgeries and impersonations. The main difference between the two is that semi-fragile watermarking is tolerant to non-malicious operations, such as lossy compression within a certain compression ratio, while fragile watermarking is intolerant to any manipulations. Robust watermarking, on the other hand, is intended for the applications of copyright protection, wherein the watermarks should survive attacks aiming at weakening or erasing them provided the quality of the attacked content is still worth protecting. Therefore, the emphasis of robust watermarking schemes is placed on their survivability against attacks. This article is intended to focus on robust watermarking schemes for the application of copyright protection. See Li and Yang (2003) and Lin and Chang (2001) for more details about fragile and semi-fragile schemes.


2000 ◽  
Vol 46 (1) ◽  
pp. 137-145 ◽  
Author(s):  
Xia-Mu Niu ◽  
Zhe-Ming Lu ◽  
Sheng-He Sun

Author(s):  
Abdul R. Zubair ◽  
Olasebikan A. Fakolujo ◽  
Periasamy K. Rajan

2012 ◽  
Vol 6 (1) ◽  
pp. 8
Author(s):  
Khalid Ahmed Ibrahim ◽  
G.K. Viju

Factors like Secrecy, Authentication, Non-repudiation and Integrity are considered in dealing with security. Watermarking is one such security measure. Watermarking technology generally permits authors to hide their names in the image behind their original work. In this proposed work, a segment based model is developed wherein the original image is partitioned into various segments and the information is made confidential. At the receiver’s end the segments are combined to obtain the original image and the secret information. The model facilitates both watermark embedding and extraction. Besides copyright protection, authentication, security, digital watermarks can also serve as invisible labels and content links.


2018 ◽  
Vol 4 (3) ◽  
pp. 5
Author(s):  
Garima Bhargava ◽  
Arun Jhapate

Digital watermarking was introduced as a result of rapid advancement of networked multimedia systems. It had been developed to enforce copyright technologies for cover of copyright possession. This technology is first used for still images however recently they need been developed for different multimedia objects like audio, video etc. Watermarking, that belong to the information hiding field, has seen plenty of research interest. There's a lot of work begin conducted in numerous branches in this field. The image watermarking techniques might divide on the idea of domain like spatial domain or transform domain or on the basis of wavelets. The copyright protection, capacity, security, strength etc are a number of the necessary factors that are taken in account whereas the watermarking system is intended. This paper aims to produce a detailed survey of all watermarking techniques specially focuses on image watermarking types and its applications in today’s world.


Author(s):  
Д.А. Мансурова ◽  
В.В. Мкртичян

Многопользовательские схемы цифровых водяных знаков (ЦВЗ) предназначены для защиты авторских прав на цифровую продукцию. В данной работе рассматриваются две схемы ЦВЗ Боне—Шоу: базовая и каскадная, проводятся исследование и сравнительный анализ этих схем с целью определения более эффективной схемы из двух по длине, а также указаны границы значений параметров схем, для которых одна схема эффективнее другой. Multiuser digital watermarking is a powerful tool for copyright protection of widely replicable digital products. This paper addresses Boneh—Shaw fingerprinting schemes. The algorithms proposed by D. Boneh and J. Shaw allow a distributor to detect any unauthorized copy and trace it back to user and they work correctly for any size of coalition. The main idea of this paper is a comparative analysis of two Boneh—Shaw digital watermarks schemes (cascade and basics), which makes clear which one of these schemes is more effective in terms of the length of the label. Using the comparative analysis and numerical experiments, we obtain the specific values of the boundaries for input parameters in which one scheme will be more efficient than another. From the results of the comparative analysis it can be concluded that for large number of users of the scheme and a small size of the coalition (in relation of users number) it is advisable to use the cascade scheme. In the case of a small number of users and a large size of the coalition (compared to the number of users) it is more expedient to use the basic scheme.


2014 ◽  
Vol 484-485 ◽  
pp. 418-422
Author(s):  
Lu Qiong ◽  
Chong Ying Wang

In recent years, the digital watermarking technology has been widely used for the copyright protection of the digital images, and a lot of the digital watermarking schemes are proposed. This paper studies the application of shuffling techniques in the digital watermarking and proposes a standard measure of the scrambling degree. The criterion measure can help us judge to what extent an image should be scrambled in order to obtain the best robustness. Finally, this paper puts forward two kinds of scrambling technologies applied in the watermarking system, and the experimental results show that the scrambling technology is very effective in keeping resilience to cropping attack.


2008 ◽  
pp. 1544-1550
Author(s):  
Huayin Si ◽  
Chang-Tsun Li

Although the development of multimedia processing techniques has facilitated the enrichment of information content, and the never-ending expansion of interconnected networks has constructed a solid infrastructure for information exchanges, meanwhile, the infrastructure and techniques have also smoothed the way for copyright piracy in virtual communities. As a result, the demand for intellectual property protection becomes apparent and exigent. In response to this challenge, digital watermarking has been proposed to serve this purpose. The idea of digital watermarking is to embed a small amount of secret information—the watermark—into the host digital productions, such as image and audio, so that it can be extracted later for the purposes of copyright assertion, authentication and content integrity verification, and so forth. Unlike traditional watermarks printed on paper, which are visible to human eyes, digital watermarks are usually invisible and can only be detected with the aid of a specially designed detector. One characteristic distinguishing digital watermarking from cryptography, which separates the digital signature from the raw data/content, is that digital watermarking embeds the signature in the content to be protected. The superiority of this characteristic is that while cryptography provides no protection after the content is decrypted, digital watermarking provides “intimate” protection, because the digital signature/secret information has become an inseparable constituent part of the content itself after embedding. Because of the very characteristic, digital watermarking requires no secret channel for communicating the digital signature that cryptography does. So in the last decade, digital watermarking has attracted numerous attention from researchers and is regarded as a promising technique in the field of information security. Various types of watermarking schemes have been developed for different applications. According to their natures, digital watermarking schemes could be classified into three categories: fragile watermarking, semi-fragile watermarking and robust watermarking. The schemes of the first two categories are developed for the purposes of multimedia authentication and content integrity verification, in which we expect the embedded watermark to be destroyed when attacks are mounted on its host media. More emphases of these schemes are placed on the capability of detecting and localizing forgeries and impersonations. The main difference between the two is that semi-fragile watermarking is tolerant to non-malicious operations, such as lossy compression within a certain compression ratio, while fragile watermarking is intolerant to any manipulations. Robust watermarking, on the other hand, is intended for the applications of copyright protection, wherein the watermarks should survive attacks aiming at weakening or erasing them provided the quality of the attacked content is still worth protecting. Therefore, the emphasis of robust watermarking schemes is placed on their survivability against attacks. This article is intended to focus on robust watermarking schemes for the application of copyright protection. See Li and Yang (2003) and Lin and Chang (2001) for more details about fragile and semi-fragile schemes.


Sign in / Sign up

Export Citation Format

Share Document