throbber
Multimedia Watermarking Techniques
`
`FRANK HARTUNG, STUDENT MEMBER, IEEE, AND MARTIN KUTTER
`
`Invited Paper
`
`Multimedia watermarking technology has evolved very quickly
`during the last few years. A digital watermark is information
`that is imperceptibly and robustly embedded in the host data
`such that it cannot be removed. A watermark typically contains
`information about
`the origin, status, or recipient of
`the host
`data. In this tutorial paper, the requirements and applications
`for watermarking are reviewed. Applications include copyright
`protection, data monitoring, and data tracking. The basic concepts
`of watermarking systems are outlined and illustrated with proposed
`watermarking methods for images, video, audio, text documents,
`and other media. Robustness and security aspects are discussed in
`detail. Finally, a few remarks are made about the state of the art
`and possible future developments in watermarking technology.
`Keywords— Audio, image, multimedia, review, video, water-
`marking.
`
`I.
`
`INTRODUCTION
`Multimedia production and distribution, as we see it
`today,
`is all digital, from the authoring tools of con-
`tent providers to the receivers. The advantages of digital
`processing and distribution, like noise-free transmission,
`software instead of hardware processing, and improved
`reconfigurability of systems, are all well known and ob-
`vious. Not so obvious are the disadvantages of digital
`media distribution. For example, from the viewpoint of
`media producers and content providers, the possibility for
`unlimited copying of digital data without loss of fidelity
`is undesirable because it may cause considerable financial
`loss. Digital copy protection or copy prevention mecha-
`nisms are only of limited value because access to cleartext
`versions of protected data must at
`least be granted to
`paying recipients which can then produce and distribute
`illegal copies. Technical attempts to prevent copying have
`in reality always been circumvented.
`One remaining method for the protection of intellectual
`property rights (IPR) is the embedding of digital water-
`marks into multimedia data. The watermark is a digital code
`
`Manuscript received October 20, 1997; revised March 26, 1998.
`F. Hartung was with the Telecommunications Laboratory, University of
`Erlangen–Nuremberg, 91058 Erlangen, Germany. He is now with Ericsson
`Eurolab, Research Department, 52134 Herzogenrath, Germany.
`M. Kutter is with Signal Processing Laboratory, Swiss Federal Institute
`of Technology, 1015 Lausanne, Switzerland.
`Publisher Item Identifier S 0018-9219(99)05174-9.
`
`unremovably, robustly, and imperceptibly embedded in the
`host data and typically contains information about origin,
`status, and/or destination of the data. Although not directly
`used for copy protection, it can at least help identifying
`source and destination of multimedia data and, as a “last
`line of defense,” enable appropriate follow-up actions in
`case of suspected copyright violations.
`While copyright protection is the most prominent appli-
`cation of watermarking techniques, others exist, including
`data authentication by means of fragile watermarks which
`are impaired or destroyed by manipulations, embedded
`transmission of value added services within multimedia
`data, and embedded data labeling for other purposes than
`copyright protection, such as data monitoring and tracking.
`An example for a data-monitoring system is the automatic
`registration and monitoring of broadcasted radio programs
`such that royalties are automatically paid to the IPR owners
`of the broadcast data.
`The development of watermarking methods involves
`several design tradeoffs. Watermarks should be robust
`against standard data manipulations, including digital-to-
`analog conversion and digital format conversion. Security
`is a special concern, and watermarks should resist even
`attempted attacks by knowledgeable individuals. On the
`other hand, watermarks should be imperceptible and convey
`as much information as possible. In general, watermark
`embedding and retrieval should have low complexity
`because for various applications, real-time watermarking is
`desirable. All of these (partly contradicting) requirements
`and the resulting design constraints will be discussed in
`more detail throughout the paper.
`The paper is organized as follows. Section II gives an
`introductory explanation of the terms used, as well as a
`few remarks about the historical aspects of watermarking.
`In Section III, common design requirements and principles
`are explained that apply to all watermarking techniques, in-
`dependent of the actual application. Sections IV–VII review
`various watermarking techniques that have been proposed
`for formatted text data,
`images, video, and audio, re-
`spectively. Watermarking of other media, including three
`dimensional (3-D) data and 3-D animation parameters, is
`discussed in Section VIII. Section IX gives detailed insight
`Sony Exhibit 1051
`Sony v. MZ Audio
`1079
`
`PROCEEDINGS OF THE IEEE, VOL. 87, NO. 7, JULY 1999
`
`0018–9219/99$10.00 © 1999 IEEE
`
`

`

`into security issues, namely attacks against watermarks, and
`shows the relations between watermarking and cryptology.
`In Section X, we extrapolate the recent development of
`watermarking technology and watermarking applications
`and try to forecast future trends. Section XI summarizes
`and concludes this paper on multimedia watermarking
`techniques.
`
`II. STEGANOGRAPHY AND WATERMARKING—HISTORY
`AND TERMINOLOGY
`
`A. History
`The idea to communicate secretly is as old as communi-
`cation itself. First stories, which can be interpreted as early
`records of covert communication, appear in the old Greek
`literature, for example, in Homer’s Iliad, or in tales by
`Herodotus. The word “steganography,” which is still in use
`today, derives from the Greek language and means covert
`communication. Kobayashi [67] and Petitcolas et al. [99]
`have investigated the history of covert communication in
`great detail, including the broad use of techniques for secret
`and covert communication before and during the two World
`Wars, and steganographic methods for analog signals. Al-
`though the historical background is very interesting, we do
`not cover it here in detail. Please refer to [67] and [99] for
`an in-depth investigation of historic aspects.
`Paper watermarks appeared in the art of handmade pa-
`permaking nearly 700 years ago. The oldest watermarked
`paper found in archives dates back to 1292 and has its
`origin in Fabriano, Italy, which is considered the birthplace
`of watermarks. At the end of the thirteenth century, about 40
`paper mills were sharing the paper marked in Fabriano and
`producing paper with different format, quality, and price.
`They produced raw, coarse paper which was smoothed
`and postprocessed by artisans and sold by merchants.
`Competition not only among the paper mills but also among
`the artisans and merchants was very high, and it was
`difficult to keep track of paper provenance and thus format
`and quality identification. The introduction of watermarks
`helped avoiding any possibility of confusion. After their
`invention, watermarks quickly spread over Italy and then
`over Europe, and although originally used to indicate the
`paper brand or paper mill, they later served as indication for
`paper format, quality, and strength and were also used to
`date and authenticate paper. A nice example illustrating the
`legal power of watermarks is a case in 1887 in France called
`“Des Decorations” [41]. The watermarks of two letters,
`presented as pieces of evidence, proved that the letters
`had been predated and resulted in considerable sensation
`and, in the end, in the resignation of President Gr´evy. For
`more information on paper watermarks, watermark history,
`and related legal issues, please refer to [144], an extensive
`listing of over 500 references.
`The analogy between paper watermarks, steganography,
`and digital watermarking is obvious, and in fact, paper
`watermarks in money bills or stamps [135] actually inspired
`the first use of the term watermarking in the context of
`digital data.
`
`The idea of digital image watermarking arose indepen-
`dently in 1990 [131], [132] and around 1993 [20], [136].
`Tirkel et al. [136] coined the word “water mark” which
`became “watermark” later on. It took a few more years
`until 1995/1996 before watermarking received remarkable
`attention. Since then, digital watermarking has gained a
`lot of attention and has evolved very quickly, and while
`there are a lot of topics open for further research, practical
`working methods and systems have been developed. In this
`paper, we introduce the concepts and illustrate them with
`some of the work that has been published. While attempting
`to be as complete as possible, we can still only give a rough
`overview.
`
`B. Terminology
`Today, we are of course concerned with digital communi-
`cation. As in classical analog communication, also in digital
`communication there is interest for methods that allow the
`transmission of information hidden or embedded in other
`data. While such techniques often share similar principles
`and basic ideas, there are also important distinguishing fea-
`tures, mainly in terms of robustness against attacks. Several
`names have been coined for such techniques. However, the
`terms are often confused, and therefore it is necessary to
`clarify the differences.
`Steganography stands for techniques in general that allow
`secret communication, usually by embedding or hiding
`the secret information in other, unsuspected data. Stegano-
`graphic methods generally do rely on the assumption that
`the existence of the covert communication is unknown
`to third parties and are mainly used in secret point-to-
`point communication between trusting parties. As a result,
`steganographic methods are in general not robust,
`i.e.,
`the hidden information cannot be recovered after data
`manipulation.
`Watermarking, as opposed to steganography, has the
`additional notion of robustness against attacks. Even if
`the existence of the hidden information is known it is
`difficult—ideally impossible—for an attacker to destroy the
`embedded watermark, even if the algorithmic principle of
`the watermarking method is public. In cryptography, this is
`known as Kerkhoffs law: a cryptosystem should be secure,
`even if an attacker knows the cryptographic principles and
`methods used but does not have the appropriate key [117].
`A practical implication of the robustness requirement is
`that watermarking methods can typically embed much less
`information into host data than steganographic methods.
`Steganography and watermarking are thus more comple-
`mentary than competitive approaches. In the remainder of
`this paper, we focus on watermarking methods and not
`on steganographic methods in general. For an overview of
`steganographic methods the reader is referred to [67], [99],
`and [124].
`Data hiding and data embedding are used in varying
`contexts, but they do typically denote either steganography
`or applications “between” steganography and watermark-
`ing, which means applications where the existence of the
`embedded data are publicly known, but there is no need
`
`1080
`
`PROCEEDINGS OF THE IEEE, VOL. 87, NO. 7, JULY 1999
`
`

`

`to protect it. This is typically the case for the embedded
`transmission of auxiliary information or services [125]
`that are publicly available and do not relate to copyright
`protection or conditional access functionalities.
`Fingerprinting and labeling are terms that denote special
`applications of watermarking. They relate to copyright
`protection applications where information about originator
`and recipient of digital data is embedded as watermarks.
`The individual watermarks, which are unique codes out of
`a series of codes, are called “fingerprints” or “labels.”
`Bit-stream watermarking is sometimes used for data
`hiding or watermarking of compressed data, for example,
`compressed video.
`The term embedded signatures has been used instead of
`“watermarking” in early publications. Because it potentially
`leads to confusion with cryptographic digital signatures
`[117], it is usually not used anymore. Cryptographic sig-
`natures serve for authentication purposes. They are used to
`detect alterations of the signed data and to authenticate the
`sender. Watermarks, however, are only in special applica-
`tions used for authentication and are usually designed to
`resist alterations and modifications.
`Visible watermarks, as the name says, are visual patterns,
`like logos, which are inserted into or overlaid on images (or
`video), very similar to visible paper watermarks. However,
`the name is confusing since visible watermarks are not
`watermarks in the sense of this paper. Visible watermarks
`are mainly applied to images, for example, to visibly mark
`preview images available in image databases or on the
`World Wide Web in order to prevent people from commer-
`cial use of such images. A visible watermarking method
`devised by Braudaway et al. [16] combines the watermark
`image with the original image by modifying the brightness
`of the original image as a function of the watermark and
`a secret key. The secret key determines pseudorandom
`scaling values used for the brightness modification in order
`to make it difficult for attackers to remove the visible mark.
`
`III. DIGITAL WATERMARKING
`A. Requirements
`The basic requirements in watermarking apply to all
`media and are very intuitive.
`1) A watermark shall convey as much information as
`possible, which means the watermark data rate should
`be high.
`2) A watermark should in general be secret and should
`only be accessible by authorized parties. This require-
`ment is referred to as security of the watermark and
`is usually achieved by the use of cryptographic keys.
`3) A watermark should stay in the host data regardless
`of whatever happens to the host data, including all
`possible signal processing that may occur, and includ-
`ing all hostile attacks that unauthorized parties may
`attempt. This requirement is referred to as robustness
`of the watermark. It is a key requirement for copy-
`right protection or conditional access applications, but
`less important for applications where the watermarks
`
`are not required to be cryptographically secure, for
`example, for applications where watermarks convey
`public information.
`4) A watermark should, though being unremovable, be
`imperceptible.
`Depending on the media to be watermarked and the appli-
`cation, this basic set of requirements may be supplemented
`by additional requirements.
`1) Watermark recovery may or may not be allowed to
`use the original, unwatermarked host data.
`2) Depending on the application, watermark embed-
`ding may be required in real time, e.g., for video
`fingerprinting. Real-time embedding again may, for
`complexity reasons, require compressed-domain em-
`bedding methods.
`3) Depending on the application, the watermark may be
`required to be able to convey arbitrary information.
`For other applications, only a few predefined water-
`marks may have to be embedded, and for the decoder
`it may be sufficient to check for the presence of one
`of the predefined watermarks (hypothesis testing).
`In the following, a few of the mentioned requirements and
`the resulting design issues are highlighted in more detail.
`1) Watermark Security and Keys: If security, i.e., secrecy
`of the embedded information, is required, one or several
`secret and cryptographically secure keys have to be used
`for the embedding and extraction process. For example,
`in many schemes, pseudorandom signals are embedded as
`watermarks. In this case, the description and the seed of the
`pseudorandom number generator may be used as key. There
`are two levels of secrecy. In the first level, an unauthorized
`user can neither read or decode an embedded watermark nor
`can he detect if a given set of data contains a watermark.
`The second level permits unauthorized users to detect if
`data are watermarked, however, the embedded information
`cannot be read without having the secret key. Such schemes
`can, for example, embed two watermarks, one with a
`public key and the other with a secret key. Alternatively, a
`scheme has been proposed which combines one or several
`public keys with a private key and embeds one combined
`public/private watermark, rather than several watermarks
`[48]. When designing an overall copyright protection sys-
`tem, issues like secret key generation, distribution, and
`management (possibly by trusted third parties), as well as
`other system integration aspects have to be considered.
`2) Robustness: In the design of any watermarking
`scheme, watermark robustness is typically one of the main
`issues, since robustness against data distortions introduced
`through standard data processing and attacks is a major
`requirement. Standard data processing includes all data
`manipulation and modification that the data might undergo
`in the usual distribution chain, such as data editing, printing,
`enhancement, and format conversion. “Attack” denotes data
`manipulation with the purpose of impairing, destroying, or
`removing the embedded watermarks. Section IX-B below
`revisits attacks and gives remedies that help to make
`watermarks attack resistent.
`
`HARTUNG AND KUTTER: MULTIMEDIA WATERMARKING TECHNIQUES
`
`1081
`
`

`

`Although it is possible to design robust watermarking
`techniques, it should be noted that a watermark is only
`robust as long as it is not public, which means as long
`as it cannot be read by everyone. If watermark detector
`principle and key are public, and even if only a “black-box”
`watermark detector is public, the watermark is vulnerable to
`attacks [28], [64]. Hence, public watermarks, as sometimes
`proposed in the literature, are not robust unless every
`receiver uses a different key. This however is difficult in
`practice and gives rise to collusion attacks.
`3) Imperceptibility: One of the main requirements for
`watermarking is the perceptual
`transparency. The data
`embedding process should not introduce any perceptible ar-
`tifacts into the host data. On the other hand, for high robust-
`ness, it is desirable that the watermark amplitude is as high
`as possible. Thus, the design of a watermarking method
`always involves a tradeoff between imperceptibility and
`robustness. It would be optimal to embed a watermark just
`below the threshold of perception. However, this threshold
`is difficult to determine for real-world image, video and
`audio signals. Several measures to determine objectively
`perceived distortion and the threshold of perception have
`been proposed for the mentioned media [75]. However,
`most of them are still not perfect enough to replace human
`viewers or listeners who judge the visual or audio fidelity
`through blind tests. Thus, in the design of watermarking
`systems, it is usually necessary to do some testing with
`volunteers. The second problem occurs in combination with
`post watermarking processing, which might result in an
`amplification of the embedded watermark and make it per-
`ceptible. An example is zooming of watermarked images,
`which often makes the embedded watermarks visible, or
`contrast enhancement, which may amplify highly frequent
`watermark patterns that are otherwise invisible.
`4) Watermark Recovery With or Without the Original Data:
`Watermark recovery is usually more robust if the original,
`unwatermarked data are available. Further, availability of
`the original data set in the recovery process allows the
`detection and inversion of distortions which change the data
`geometry. This helps, for example, if a watermarked image
`has been rotated by an attacker. However, access to the orig-
`inal data is not possible in all cases, for example, in applica-
`tions such as data monitoring or tracking. For other applica-
`tions, like video watermarking, it may be impractical to use
`the original data because of the large data volume, even if it
`is available. It is, however, possible to design watermarking
`techniques that do not need the original for watermark ex-
`traction. Most watermarking techniques perform some kind
`of modulation in which the original data set is considered a
`distortion. If this distortion is known or can be modeled
`in the recovery process, explicitly designed techniques
`allow its suppression without knowledge of the original.
`In fact, most recent methods do not require the original for
`watermark recovery. In some publications, such techniques
`are called “blind” watermarking techniques [2], [1].
`5) Watermark Extraction or Verification of Presence for a
`Given Watermark: In the literature, two different types of
`watermarking systems can be found: systems that embed
`
`a specific information or pattern and check the existence
`of the (known) information later on in the watermark re-
`covery—usually using some sort of hypothesis testing—and
`systems that embed arbitrary information into the host data.
`The first type, verification of the presence of a known
`watermark, is sufficient for most copyright-protection ap-
`plications.
`The second type, embedding of arbitrary information, is,
`for example, useful for image tracking on the Internet with
`intelligent agents where it might not only be of interest to
`discover images, but also to classify them. In such cases, the
`embedded watermark can serve as an image identification
`number. Another example where arbitrary information has
`to be embedded are applications for video distribution
`where, e.g., the serial number of the receiver has to be
`embedded.
`Although most presented methods or systems are de-
`signed for either watermark extraction or verification of
`presence for a given watermark, it should be noted that in
`fact both approaches are inherently equivalent. A scheme
`that allows watermark verification can be considered as
`a 1-bit watermark recovery scheme, which can easily be
`extended to any number of bits by embedding several
`consecutive “1-bit watermarks.” The inverse is also true:
`a watermark recovery scheme can be considered as a
`watermark verification scheme assuming the embedded
`information is known.
`
`B. Basic Watermarking Principles
`The basic idea in watermarking is to add a watermark
`signal to the host data to be watermarked such that the
`watermark signal is unobtrusive and secure in the signal
`mixture but can partly or fully be recovered from the signal
`mixture later on if the correct cryptographically secure key
`needed for recovery is used.
`To ensure imperceptibility of the modification caused by
`watermark embedding, a perceptibility criterion of some
`sort is used. This can be implicit or explicit, host data
`adaptive or fixed, but it is necessary. As a consequence of
`the required imperceptibility, the individual samples (e.g.,
`pixels or transform coefficients) that are used for watermark
`embedding can only be modified by an amount relatively
`small to their average amplitude.
`To ensure robustness despite the small allowed changes,
`the watermark information is usually redundantly dis-
`tributed over many samples (e.g., pixels) of the host data,
`thus providing a “holographic” robustness, which means
`that the watermark can usually be recovered from a small
`fraction of the watermarked data, but the recovery is more
`robust if more of the watermarked data are available for
`recovery.
`As said before, watermark systems do in general use one
`or more cryptographically secure keys to ensure security
`against manipulation and erasure of the watermark.
`There are three main issues in the design of a water-
`marking system.
`
`1082
`
`PROCEEDINGS OF THE IEEE, VOL. 87, NO. 7, JULY 1999
`
`

`

`Fig. 1. Generic digital watermarking scheme.
`
`Fig. 2. Generic watermark recovery scheme.
`
`to be added to the
`1) Design of the watermark signal
`host signal. Typically, the watermark signal depends
`and watermark information
`on a key
`
`Possibly, it may also depend on the host data
`which it is embedded
`
`(1)
`into
`
`(2)
`2) Design of the embedding method itself that incorpo-
`into the host data
`rates the watermark signal
`yielding watermarked data
`
`(3)
`3) Design of the corresponding extraction method that
`recovers the watermark information from the signal
`mixture using the key and with help of the original
`(4)
`
`or without the original
`
`(5)
`
`The first two issues, watermark signal design and water-
`mark signal embedding, are often regarded as one, specif-
`ically for methods were the embedded watermark is host
`signal adaptive.
`Figs. 1 and 2 illustrate the concept. Fig. 1 shows the
`generic watermarking scheme for the embedding process.
`The input to the scheme is the watermark, the host data, and
`an optional public or secret key. The host data may, depend-
`ing on the application, be uncompressed or compressed,
`however, most proposed methods work on uncompressed
`data. The watermark can be of any nature, such as a number,
`text, or an image. The secret or public key is used to enforce
`security. If the watermark is not to be read by unauthorized
`parties, a key can be used to protect the watermark. In
`combination with a secret or a public key, the watermarking
`techniques are usually referred to as secret and public
`watermarking techniques, respectively. The output of the
`watermarking scheme are the modified, i.e., watermarked,
`
`data. The generic watermark recovery process is depicted
`in Fig. 2. Inputs to the scheme are the watermarked data,
`the secret or public key, and, depending on the method,
`the original data and the original watermark. The output
`of the watermark recovery process is either the recovered
`watermark or some kind of confidence measure indicating
`how likely it is for the given watermark at the input to be
`present in the data under inspection.
`ideas
`Many proposed watermarking schemes use
`borrowed from spread-spectrum radio communications
`[25], [43], [101]. They embed a watermark by adding
`a pseudonoise (PN) signal with low amplitude to the host
`data. This specific PN signal can later on be detected using
`a correlation receiver or matched filter. If the parameters
`like amplitude and the number of samples of the added PN
`signal are chosen appropriately, the probabilities of false-
`positive or false-negative detections are very low. The PN
`signal has the function of a secret key. The scheme can be
`extended if the PN signal is either added or subtracted from
`the host signal. In this case, the correlation receiver will
`calculate either a high-positive or high-negative correlation
`in the detection. Thus, 1 bit of information can be conveyed.
`If several such watermarks are embedded consecutively,
`arbitrary information can be conveyed.
`
`IV. TEXT DOCUMENT WATERMARKING
`Methods for embedding information into text documents
`have been used for a long time by secret services.
`For text watermarking, we have to distinguish between
`methods that hide information in the semantics, which
`means in the meaning and ordering of the words, and
`methods that hide information in the format, which means
`in the layout and the appearance.
`The first class designs a text around the message to be
`hidden. In that sense, the information is not really embedded
`in existing information, but rather covered by misleading
`information. This class of techniques is outside the scope of
`this paper and will not be considered here. In the following,
`we concentrate on the latter type of information-embedding
`methods which use an existing text document into which
`data are embedded.
`Formatted text is probably the medium where watermark-
`ing methods can be defeated most easily. If the watermark
`is in the format, then it can obviously be removed by
`“retyping” the whole text using a new character font and
`a new format where “retyping” can be either manual or
`automated using optical character recognition (OCR). OCR
`systems are still not perfect for many applications today
`and often need human supervision. Thus, removal of water-
`marks either yields bad results (single characters are wrong,
`due to OCR) or is expensive. The goal is to make watermark
`removal more expensive than obtaining the right to copy
`from the copyright owner. If this goal is achieved, text
`watermarking makes sense, though it can be defeated [14].
`Text watermarking has applications wherever copyrighted
`electronic documents are distributed. Important examples
`are virtual digital
`libraries where users may download
`
`HARTUNG AND KUTTER: MULTIMEDIA WATERMARKING TECHNIQUES
`
`1083
`
`

`

`Fig. 3. Example for word-shift coding.
`
`copies of documents, for example, books, but are not al-
`lowed to further distribute them or to store them longer than
`for a certain predefined period. In this type of application,
`a requested document
`is watermarked with a requester
`specific watermark before releasing it for download. If later
`on illegal copies are discovered, the embedded watermark
`can be used to determine the source.
`Brassil et al. [14], [15], [84], [85], [91] have extensively
`worked on text watermarking. They propose three different
`methods for information embedding into text documents:
`line shift coding; word-shift coding; and feature coding.
`In line-shift coding, single lines of the document are
`shifted upwards or downwards by very small amounts. The
`information to be hidden is encoded in the way the lines are
`shifted. Similarly, words are shifted horizontally in order
`to modify the spaces between consecutive words in word-
`shift coding. An example for word-shift coding is shown in
`Fig. 3. Both methods are applicable to the format file of a
`document or to the bitmap of a page image. While line-shift
`coding can rely on the assumption that lines are uniformly
`spaced, and thus does not necessarily need the original for
`watermark extraction, the original is required for extraction
`in word-shift coding, since the spaces between words are
`usually variable. The third method, feature coding, slightly
`modifies features such as the length of the end lines in
`etc. Among the three presented
`characters like
`methods, line-shift coding is the most robust in the presence
`of noise but also most easily defeated. The authors again
`argue that although the described methods can theoretically
`be defeated, it requires interactive human intervention and
`is expensive in practice. The presented methods are robust
`enough to resist printing, consecutive photocopying up to
`ten generations, and rescanning [85].
`
`IMAGE WATERMARKING
`V.
`Most watermarking research and publications are focused
`on images. The reason might be that there is a large demand
`for image watermarking products due to the fact that there
`are so many images available at no cost on the World Wide
`Web which need to be protected.
`Meanwhile,
`the number of image watermarking pub-
`lications is too large to give a complete survey over
`all proposed techniques. However, most techniques share
`common principles. Thus, we try to point out the common
`ideas first, before we explain some selected methods in
`more detail to illustrate how the principles are applied in
`practice.
`The watermark signal is typically a pseudorandom signal
`with low amplitude, compared to the image amplitude, and
`usually with spatial distribution of one information (i.e.,
`watermark) bit over many pixels. A lot of watermarking
`methods are in fact very similar and differ only in parts or
`
`single aspects of the three topics: signal design; embedding;
`and recovery.
`The information that is embedded is usually not important
`for the watermarking itself. However, there are methods that
`are designed to embed and extract one out of a codebook of
`codes, and thus cannot accommodate arbitrary information
`[27], [72]. Other proposed schemes modulate the codes
`available in the codebook with arbitrary information bits
`and can thus accommodate arbitrary messages. Although
`some authors distinguish strictly between the two types,
`they are in fact conceptually very close.
`The watermark signal is often designed as a white [136],
`[139] or colored pseudorandom signal with, e.g., Gaussian
`[27], uniform, or bipolar [33], [72], [76], [93], [136], prob-
`ability density function (pdf). In order to avoid visibility
`of the embedded watermark, an implicit or explicit spatial
`[7], [66], [126], [146] or spectral [66], [105], [106], [126],
`[130], [146] shaping is often applied with the goal to atten-
`uate the watermark in areas of the image where it would
`otherwise become visible. The resulting watermark signal is
`sometimes sparse and leaves image pixels unchanged [33],
`[74], but mostly it is dense and alters all pixels of the image
`to be watermarked. The watermark signal is often designed
`in the spatial domain, but sometimes also in a transform
`domain like the full-image discrete cosine transform (DCT)
`domain [27] or block-wise DCT domain [69].
`The signal embedding is done by addition [78], [93],
`[139] or signal-adaptive (i.e., scaled) addition [2], mostly
`to the luminance channel alone, but sometimes also to
`color channels, or only to color channels [73]. The addition
`can take place in the spatial domain, or in transform
`domains such as the discrete Fourier transform

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket