Introduction to digital watermarking -...
Transcript of Introduction to digital watermarking -...
![Page 1: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/1.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Multimedia Security Introduction to digital watermarking Mauro Barni University of Siena
![Page 2: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/2.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Summary • Motivations
– Copyright protection – Other applications
• authentication • Most common requirements
– Robustness / Capacity / Invisibility – Protocol considerations
• Basic definitions – Blind vs. non blind systems – Readable vs. detectable watermarking – Preliminary examples
![Page 3: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/3.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Document protection • Confidentiality
– interception of data must be avoided • Authentication
– true origin of the document must be verified • Integrity
– data content must not be changed • Copyright protection
– non-authorized copying must be avoided
![Page 4: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/4.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Digital watermarking • Encryption does not solve the problem of unauthorized
copying • Multimedia data should be marked to allow distribution to
be tracked • Digital watermarking can provide
– an additional layer of protection after decryption – data authentication and integrity
![Page 5: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/5.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Digital watermark • Data hiding with special requirements
– robustness – perceptual invisibility
• In copyright applications, a digital watermark is an identification code bearing information about the copyright owner, authorized consumers and so on
• It is permanently embedded into digital data for copyright protection, data authentication, integrity checking
• In most applications the watermark is not visible (perceivable) to a human observer, so that data quality is not degraded
![Page 6: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/6.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Watermark content
• Depending on the application the information conveyed by the watermark may vary
• Allowed uses • Purchaser identification (fingerprinting) • Transaction details • Authentication • ...
![Page 7: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/7.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
The killer application: copy control
• Copyright concerns: revenues from digital music and digital video at risk
• DRM: use of technology to prevent non-authorized viewing, copying, printing, editing, distributing of copyrighted material
• Agreement between manufacturers, copyright owners, sellers
![Page 8: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/8.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Watermarking and DRM (copy control) • Manufacturers agree to produce only compliant devices
refusing playing, copying, editing copyrighted material without proper rights
• Cryptography by itself is not enough since it can not survive D/A – A/D conversion
• Watermarking would provide an additional layer of security after decryption
Legal(CSS)
Illegal(wat)
CC Player
NC Player
CC Recorder
NC Recorder
STOP STOP
wat/CGMS
STOP (wat/CGMS) STOP (wat/CGMS)
![Page 9: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/9.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
DRM temporarily abandoned • At the end of nineties the DRM approach to
copyright protection was abandoned • Watermarking does not have much to do with that • Main problem is agreement between stakeholders • Public opinion also played a role • SDMI’s activity stops, CPTWG starts exploring
different routes
• Popular again now ...
![Page 10: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/10.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
CINAVIA protection of Blue-ray disks
Watermark W"
Original"content" Watermarked"
content"
Watermarking
watermark
Encryption Protected"content"
![Page 11: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/11.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
CINAVIA protection of Blue-ray disks
Legitimate user"
watermark Decryption
Protected"content"
Free view"Successful decryption
proves user is legitimate"
The player retrieves the watermark, but since the content was previously decrypted the user has already demonstrated his right to view the content
The content can be copied only under encryption (or can not be copied depending on the device)
![Page 12: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/12.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
CINAVIA protection of Blue-ray disks
watermark Compliant player with watermark
detector
Compliant players refuse to show non-encrypted
contents containing the
watermark"A pirate can obtain a non-encrypted, but watermarked,
content"
Illegally copied contents can be viewed (copied) only on non-compliant devices
The watermark can be removed only by degrading significantly the quality of the content
![Page 13: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/13.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Buyer-seller protocol • In a buyer-seller protocol, the seller inserts the ID of the
buyer in every piece of content it sells • The presence of the code can be used later on to trace
back to the buyer that first distributed the content without permission
Seller
B1
B2 Bn …
A+w1
A+w2 A+wn
![Page 14: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/14.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Ownership verification
• The watermark contains the name of the owner (or creator) of the content - Perhaps it is the oldest use of watermarking - Requires a complete infrastructure and
usage of cryptographic tools
![Page 15: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/15.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Other applications: authentication • Decide whether a given document is original or it has
been tampered with • Possibly localize the tampered region • Two approaches are possible
– Fragile (or semi fragile) watermarking – Robust watermarking plus perceptual hashing
![Page 16: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/16.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Authentication via fragile watermarking
• A fragile watermark is lost as soon as the image is modified
![Page 17: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/17.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Authentication via fragile watermarking
• Watermark loss is taken as evidence of image tampering
![Page 18: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/18.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Authentication via robust watermarking • With robust watermarking a summary of the image is
inserted within the image itself
![Page 19: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/19.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Authentication via robust watermarking
• Complementary merits and drawbacks with respect to fragile watermarking
![Page 20: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/20.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Other applications: labelling / captioning
• Attach a piece of information to a multimedia content • Due to change-of-format invariance it can be used for
– Content retrieval – Database access – Enhanced services with legacy constraint – Access control
![Page 21: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/21.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Connect the digital and analog worlds • Due to the ability to survive D/A and A/D
conversion, the hidden data could provide a mean to link the analog and the digital world
• Alternative to barcodes • Second screen application for
• Advertisement • Added services • Navigation
![Page 22: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/22.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Most common requirements • Requirements strongly depend on the application. The
most important ones are – Invisibility (unobtrusiveness) – Robustness (sometimes security) – Capacity
• Other requirements include – Simplicity – Scalability – Decoder / detector blindness
![Page 23: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/23.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Most common requirements • Invisibility, robustness and capacity form the so-called
watermarking trade-off triangle
Invisibility
Capacity Robustness (Security)
![Page 24: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/24.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Robustness criteria • Signal processing
– enhancement, sharpening, blurring, linear/non-linear filtering (median, de-speckle)
• Compression – Robustness against JPEG compression is
mandatory • Geometric manipulations
– resizing, cropping, translation, rotation, flip • A/D – D/A conversion
![Page 25: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/25.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Robustness criteria • For a quantitative measure of robustness, a given attack,
or a combined attack, is carried out at different strength levels, the higher the level the watermark survives the higher the robustness
• Use of watermark-breaking tools – Stirmark:
http://www.cl.cam.ac.uk/~mgk25/stirmark.html – Certimark - IST European Project:
http://www.certimark.org
![Page 26: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/26.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Robustness vs. Security • Robustness deals with non-malicious manipulations • Security considers malicious (targeted) attacks in a
hostile environment • In a security analysis it is assumed that the attacker
knows the watermarking algorithm: hence ad-hoc attacks can be conceived
![Page 27: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/27.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Measuring security • Theoretical approach (1)
– Evaluating the mutual information between the secrets and the observables
• Theoretical approach (2) – Showing the equivalence of watermark breaking and
solution of an intractable problem Theoretical approach (3)
– Use a game-theoretic approach • Practical approach
– Expose the watermark to large scale, massive attacks, e.g. BOWS contest(s)
![Page 28: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/28.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
BOWS Contest • BOWS = Break Our Watermarking System • Two contests among watermark breakers • Aim: see how a watermark behaves under massive attacks,
identify new attacks and major threats in a real scenario – Three images with an unknown (first phase) watermark
available – Contenders task: to remove the watermark while keeping
the PSNR maximum – Detector available via web – More than 150.000 attempts – Winner: 39 db (first phase), 51 db (second phase)
![Page 29: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/29.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
BOWS Contest (2nd) • First phase: as BOWS 1 with limited access to the system • Second phase: same as first phase without access limits
(sensitivity attacks) • Third phase: security attacks
– 10000 test images available – Try to estimate the secret keys – Use them to remove the watermark from other 3 images – Limited access to the web site to avoid sensitivity attacks
• Winners: – Episode 1: best PSNR: 24.3dB – Episode 2: best PSNR: 50.2dB – Episode 3: best PSNR: 46.2dB
![Page 30: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/30.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Classification of techniques • Decoding process
– blind techniques • the watermark is recovered without resorting to
the original non-marked content or any information derived from it
– non-blind techniques • the original content is needed to read the
watermark • robustness is more easily achieved • often the application scenario does not allow the
decoder to access the original content
![Page 31: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/31.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Classification of techniques • Decoding process
– detectable (1-bit, 0-bit) watermark • it is only possible to decide whether a given
watermark is embedded in the image
WatermarkDetector
yes/no
Aw
b*
A K
`
![Page 32: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/32.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Classification of techniques • Decoding process
– readable watermark (multi-bit watermarking) • the bits hidden in the image can be read without
knowing them in advance
Watermark
Decoder
Aw
A K
`b
*
![Page 33: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/33.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
From multi-bit to 1-bit watermarking • Passing from multi-bit to 1-bit watermarking is rather
easy
WatermarkDecoder
Aw
A K
` bComparison
b*
yes/no
• Going the other way-round is also possible but it leads to inefficient schemes
![Page 34: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/34.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Protocol-level considerations • It is important to stress out that the requirements a
watermarking system must satisfy are dictated by the application scenario the system must work in.
• For instance, the particular Electronic Copyright Management System used to protect image IPR must be taken into account.
• The blind/non-blind, detectable/readable nature of the watermark must be chosen in this way
![Page 35: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/35.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Example: the IBM attack
I
I+A
I+A-B
Public image
Alice’s image
Bob’s image
Decoder B is found in the public image
A is found in the public image
Who is the owner of the public image ?
Decoder
![Page 36: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/36.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Example: the IBM attack
I
I+A-B
Public image
Alice’s image
Bob’s image
Decoder
Who is the owner of the public image ?
Decoder
A is found in Bob’s image
B is found in Alice’s image
![Page 37: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/37.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Buyer-seller protocol
• In a fingerprinting scenario the seller inserts the identification code of the buyer in every piece of content it sells
• The presence of the code can be used later on to trace back to the buyer that first distributed the content without permission
Seller
B1
B2 Bn
A+w1
A+w2 A+wn
…
![Page 38: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/38.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Buyer-seller protocol • A buyer whose watermark is found in an unauthorized copy can
not be inculpated since he/she can claim that the unauthorized copy was created and distributed by the seller.
• The seller could redistribute many copies of a work containing the fingerprint of a buyer (say B1) without paying the due royalties to the author, and claim that such copies were illegally distributed or sold by B1
Seller
B1
B2 Bn
A+w1
A+w1 A+w1
…
![Page 39: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/39.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
State of the art
• Despite the difficulties, the state of the art is well advanced, and several problems have been solved
• The systems developed so far ensure very good results from the point of view of robustness and capacity
![Page 40: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/40.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Example*
Watermarked image (PSNR = 50dB)
Original Image
* M. Barni, F. Bartolini, A. De Rosa, and A. Piva, “A new decoder for the optimum recovery of non-additive watermarks, IEEE Trans. Image Processing, 10 (2001), pp. 755–766.
![Page 41: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/41.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Detector answer
-400-300-200-100
0100200300
1 200 400 600 800 1000watermark
responsethreshold
![Page 42: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/42.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Example: robustness
JPEG compression with quality factor = 3%
![Page 43: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/43.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Example: robustness
Addition of white gaussian noise with variance = 2000
![Page 44: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/44.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Example: robustness
Print, copying and scanning
![Page 45: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/45.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
(Main) open problems
• Importance and exploitation of perceptual aspects – Video – 3D: meshes, cinema – Haptic interfaces
• Robustness against geometric attacks • Security
– Sensitivity attack – Collusion attack
![Page 46: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/46.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
Working applications • Though several open problems exist, watermarking is
more and more used – Video, cinema – Still images on the web – Second screen applications – Labelling / tagging
• Visit the Digimarc web site for a number of amazing applications: http://www.digimarc.com
![Page 47: Introduction to digital watermarking - unisi.itclem.dii.unisi.it/~vipp/files/MultimediaSecurity/MS_introWat.pdf · Introduction to digital watermarking ... • Decide whether a given](https://reader034.fdocuments.net/reader034/viewer/2022052516/5b0889cb7f8b9a520e8ccdbc/html5/thumbnails/47.jpg)
University of Siena
Introduction to Watermarking M. Barni, University of Siena
References
• I. J. Cox, M. Miller, J. Bloom, Digital watermarking, Morgan Kaufmann
• M. Barni, F. Bartolini, Watermarking Systems
Engineering: Enabling Digital Assets Security and other Applications, Marcel Dekker, New York, 2004.