History
The term ''digital watermark'' was coined by Andrew Tirkel and Charles Osborne in December 1992. The first successful embedding and extraction of a steganographic spread spectrum watermark was demonstrated in 1993 by Andrew Tirkel, Gerard Rankin, Ron Van Schyndel, Charles Osborne, and others. Watermarks are identification marks produced during the paper-making process. The first watermarks appeared in Italy during the 13th century, but their use rapidly spread across Europe. They were used as a means to identify the paper maker or the trade guild that manufactured the paper. The marks often were created by a wire sewn onto the paper mold. Watermarks continue to be used today as manufacturer's marks and to prevent forgery.Applications
Digital watermarking may be used for a wide range of applications, such as: * Copyright protection in some media like digital artworks. * Source tracking (different recipients get differently watermarked content) * Broadcast monitoring (television news often contains watermarked video from international agencies) * Video authentication * Software crippling on screencasting andDigital watermarking life-cycle phases
The information to be embedded in a signal is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the ''host'' signal. A watermarking system is usually divided into three distinct steps, embedding, attack, and detection. In embedding, an algorithm accepts the host and the data to be embedded, and produces a watermarked signal. Then the watermarked digital signal is transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an ''attack''. While the modification may not be malicious, the term attack arises from copyright protection application, where third parties may attempt to remove the digital watermark through modification. There are many possible modifications, for example, lossy compression of the data (in which resolution is diminished), cropping an image or video, or intentionally adding noise. ''Detection'' (often called extraction) is an algorithm that is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark still is present and it may be extracted. In ''robust'' digital watermarking applications, the extraction algorithm should be able to produce the watermark correctly, even if the modifications were strong. In ''fragile'' digital watermarking, the extraction algorithm should fail if any change is made to the signal.Classification
A digital watermark is called ''robust'' with respect to transformations if the embedded information may be detected reliably from the marked signal, even if degraded by any number of transformations. Typical image degradations are JPEG compression, rotation, cropping, additive noise, and quantization. For video content, temporal modifications and MPEG compression often are added to this list. A digital watermark is called ''imperceptible'' if the watermarked content is perceptually equivalent to the original, unwatermarked content. In general, it is easy to create either robust watermarks imperceptible watermarks, but the creation of both robust imperceptible watermarks has proven to be quite challenging. Robust imperceptible watermarks have been proposed as a tool for the protection of digital content, for example as an embedded ''no-copy-allowed'' flag in professional video content. Digital watermarking techniques may be classified in several ways.Robustness
A digital watermark is called ''fragile'' if it fails to be detectable after the slightest modification. Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications to an original work that clearly are noticeable, commonly are not referred to as watermarks, but as generalizedPerceptibility
A digital watermark is called ''imperceptible'' if the original cover signal and the marked signal are perceptually indistinguishable. A digital watermark is called ''perceptible'' if its presence in the marked signal is noticeable (e.g. digital on-screen graphics like a network logo, content bug, codes, opaque images). On videos and images, some are made transparent/translucent for convenience for consumers due to the fact that they block portion of the view; therefore degrading it. This should not be confused with ''perceptual'', that is, watermarking which uses the limitations of human perception to be imperceptible.Capacity
The length of the embedded message determines two different main classes of digital watermarking schemes: * The message is conceptually zero-bit long and the system is designed in order to detect the presence or the absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to as ''zero-bit'' or ''presence watermarking schemes''. * The message is an n-bit-long stream , with or and is modulated in the watermark. These kinds of schemes usually are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes.Embedding method
A digital watermarking method is referred to as '' spread-spectrum'' if the marked signal is obtained by an additive modification. Spread-spectrum watermarks are known to be modestly robust, but also to have a low information capacity due to host interference. A digital watermarking method is said to be of ''quantization type'' if the marked signal is obtained by quantization. Quantization watermarks suffer from low robustness, but have a high information capacity due to rejection of host interference. A digital watermarking method is referred to as ''Evaluation and benchmarking
The evaluation of digital watermarking schemes may provide detailed information for a watermark designer or for end-users, therefore, different evaluation strategies exist. Often used by a watermark designer is the evaluation of single properties to show, for example, an improvement. Mostly, end-users are not interested in detailed information. They want to know if a given digital watermarking algorithm may be used for their application scenario, and if so, which parameter sets seems to be the best.Cameras
Epson and Kodak have produced cameras with security features such as the Epson PhotoPC 3000Z and the Kodak DC-290. Both cameras added irremovable features to the pictures which distorted the original image, making them unacceptable for some applications such as forensic evidence in court. According to Blythe and Fridrich, " ither camera can provide an undisputable proof of the image origin or its author". A secure digital camera (SDC) was proposed by Saraju Mohanty, et al. in 2003 and published in January 2004. This was not the first time this was proposed. Blythe and Fridrich also have worked on SDC in 2004 for aReversible data hiding
''Reversible data hiding'' is a technique which enables images to be authenticated and then restored to their original form by removing the digital watermark and replacing the image data that had been overwritten.Watermarking for relational databases
Digital watermarking forSee also
* Chip art * Coded Anti-Piracy * Copy attack * EURion constellation * Pattern Recognition (novel) * Steganography * Traitor tracing * Watermark (data file) * Audio watermark * Digital on-screen graphic * Automatic content recognitionReferences
Further reading
External links
{{DEFAULTSORT:Digital Watermarking Authentication methods Watermarking Digital photography