History
The term "Digital Watermark" was coined by Andrew Tirkel and Charles Osborne in December 1992. The first successful embedding and extraction of a steganographic spread spectrum watermark was demonstrated in 1993 by Andrew Tirkel, Charles Osborne and Gerard Rankin. Watermarks are identification marks produced during the paper making process. The first watermarks appeared in Italy during the 13th century, but their use rapidly spread across Europe. They were used as a means to identify the paper maker or the trade guild that manufactured the paper. The marks often were created by a wire sewn onto the paper mold. Watermarks continue to be used today as manufacturer's marks and to prevent forgery.Applications
Digital watermarking may be used for a wide range of applications, such as: * Copyright protection * Source tracking (different recipients get differently watermarked content) * Broadcast monitoring (television news often contains watermarked video from international agencies) * Video authentication * Software crippling on screencasting andDigital watermarking life-cycle phases
Classification
A digital watermark is called ''robust'' with respect to transformations if the embedded information may be detected reliably from the marked signal, even if degraded by any number of transformations. Typical image degradations are JPEG compression, rotation, cropping, additive noise, and quantization. For video content, temporal modifications and MPEG compression often are added to this list. A digital watermark is called ''imperceptible'' if the watermarked content is perceptually equivalent to the original, unwatermarked content. In general, it is easy to create either robust watermarks—or—imperceptible watermarks, but the creation of both robust—and—imperceptible watermarks has proven to be quite challenging. Robust imperceptible watermarks have been proposed as a tool for the protection of digital content, for example as an embedded ''no-copy-allowed'' flag in professional video content. Digital watermarking techniques may be classified in several ways.Robustness
A digital watermark is called "fragile" if it fails to be detectable after the slightest modification. Fragile watermarks are commonly used for tamper detection (integrity proof). Modifications to an original work that clearly are noticeable, commonly are not referred to as watermarks, but as generalized barcodes. A digital watermark is called ''semi-fragile'' if it resists benign transformations, but fails detection after malignant transformations. Semi-fragile watermarks commonly are used to detect malignant transformations. A digital watermark is called ''robust'' if it resists a designated class of transformations. Robust watermarks may be used in copy protection applications to carry copy and no access control information.Perceptibility
A digital watermark is called ''imperceptible'' if the original cover signal and the marked signal are perceptually indistinguishable. A digital watermark is called ''perceptible'' if its presence in the marked signal is noticeable (e.g. digital on-screen graphics like a network logo, content bug, codes, opaque images). On videos and images, some are made transparent/translucent for convenience for consumers due to the fact that they block portion of the view; therefore degrading it. This should not be confused with ''perceptual'', that is, watermarking which uses the limitations of human perception to be imperceptible.Capacity
The length of the embedded message determines two different main classes of digital watermarking schemes: * The message is conceptually zero-bit long and the system is designed in order to detect the presence or the absence of the watermark in the marked object. This kind of watermarking scheme is usually referred to as ''zero-bit'' or ''presence watermarking schemes''. * The message is an n-bit-long stream , with or and is modulated in the watermark. These kinds of schemes usually are referred to as multiple-bit watermarking or non-zero-bit watermarking schemes.Embedding method
A digital watermarking method is referred to as '' spread-spectrum'' if the marked signal is obtained by an additive modification. Spread-spectrum watermarks are known to be modestly robust, but also to have a low information capacity due to host interference. A digital watermarking method is said to be of ''quantization type'' if the marked signal is obtained by quantization. Quantization watermarks suffer from low robustness, but have a high information capacity due to rejection of host interference. A digital watermarking method is referred to as '' amplitude modulation'' if the marked signal is embedded by additive modification which is similar to spread spectrum method, but is particularly embedded in the spatial domain.Evaluation and benchmarking
The evaluation of digital watermarking schemes may provide detailed information for a watermark designer or for end-users, therefore, different evaluation strategies exist. Often used by a watermark designer is the evaluation of single properties to show, for example, an improvement. Mostly, end-users are not interested in detailed information. They want to know if a given digital watermarking algorithm may be used for their application scenario, and if so, which parameter sets seems to be the best.Cameras
Epson and Kodak have produced cameras with security features such as the Epson PhotoPC 3000Z and the Kodak DC-290. Both cameras added irremovable features to the pictures which distorted the original image, making them unacceptable for some applications such as forensic evidence in court. According to Blythe and Fridrich, " ither camera can provide an undisputable proof of the image origin or its author". A secure digital camera (SDC) was proposed by Saraju Mohanty, et al. in 2003 and published in January 2004. This was not the first time this was proposed. Blythe and Fridrich also have worked on SDC in 2004 for aReversible data hiding
''Reversible data hiding'' is a technique which enables images to be authenticated and then restored to their original form by removing the digital watermark and replacing the image data that had been overwritten. This would make the images acceptable for legal purposes. The US Army also is interested in this technique for authentication ofWatermarking for relational databases
Digital watermarking for relational databases has emerged as a candidate solution to provide copyright protection, tamper detection, traitor tracing, and maintaining integrity of relational data. Many watermarking techniques have been proposed in the literature to address these purposes. A survey of the current state-of-the-art and a classification of the different techniques according to their intent, the way they express the watermark, the cover type, granularity level, and verifiability was published in 2010 by Halder et al. in theSee also
* Coded Anti-Piracy * Copy attack * EURion constellation * Pattern Recognition (novel) * Steganography * Traitor tracing * Watermark (data file) * Audio watermark * Digital on-screen graphic * Automatic content recognitionReferences
Further reading
External links
{{DEFAULTSORT:Digital Watermarking Authentication methods Watermarking Digital photography