Abstract
We propose using emergable watermarks as copy indicators that become visible in video content that has been copied under designated conditions. A watermark pattern is designed that is sensitive to image processing specific to illegal copying. This is done on the basis of the aliasing effect, which causes image distortion when the re-sampling frequency is low. Watermarks using such patterns are embedded in the original video. They become visible only if the copy had been illegally generated by re-encoding with designated scaling. They show, for example, copy indicators, warning the viewer that the video had been illegally copied, and distort the image quality. Testing of a prototype implementation demonstrated the effectiveness of this method. The peak-signal-to-noise-ratio in watermarked video was adjustable by more than 28 dB. Use of this method should help deter the illegal copying and/or distributing of copyrighted videos.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
George, C., Scerri, J.: Web 2.0 and user-generated content: legal challenges in the new frontier. Journal of Information, Law and Technology 2 (2007)
Bloom, J.A., Cox, I.J., Kalker, T., Linnartz, J.-P.M.G., Miller, M.L., Traw, C.B.S.: Copy protection for DVD video. Proc. IEEE 87(7), 1267–1276 (1999)
Hartung, F., Ramme, F.: Digital rights management and watermarking of multimedia content for M-commerce applications. IEEE Communication Magazine 38(11), 78–84 (2000)
Yamada, T., Gohshi, S., Echizen, I.: Re-shooting prevention based on difference between sensory perceptions of humans and devices. In: Proc. of Int’l Conf. on Image Processing (ICIP 2010), pp. 993–996 (2010)
Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann (2007)
Wu, et al.: Watermarking for image authentication. In: Proc. of IEEE Int’l Conf. on Image Processing, vol. 2, pp. 437–441 (1998)
Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE, vol. 3312, pp. 296–307 (1998)
Lin, C.Y., Chang, S.F.: Issues and solutions for authenticating MPEG Video. In: Proc. SPIE, vol. 3657, pp. 54–65 (1999)
Jeong, Y.J., Kim, W.H., Moon, K.S., Kim, J.N.: Implementation of watermark detection system for hardware based video watermark embedder. In: Proc. of Int’l Conf. on Convergence and Hybrid Information Technology, pp. 450–453 (2008)
Atomori, Y., Echizen, I., Dainaka, M., Nakayama, S., Yoshiura, H.: Robust video watermarking based on dual plane correlation for immunity to rotation, scale, translation, and random distortion. Journal of Digital Information Management 6(2), 161–167 (2008)
Yamada, T., Takashima, K., Yoshioka, H.: Development of Transcoder in Conjunction with Video Watermarking to Deter Information Leak. In: de Leon, F., de Carvalho, A.P., et al. (eds.) Distributed Computing and Artificial Intelligence. AISC, vol. 79, pp. 229–236. Springer, Heidelberg (2010)
van Renesse, R.L.: Paper based document security – a review. In: Proc. of European Conference on Security and Detection (ECOS 1997), vol. (437), pp. 75–80 (1997)
Huang, S., Wu, J.K.: Optical watermarking for printed document authentication. IEEE Trans. on Information Forensics and Security 2(2), 164–173 (2007)
The Institute of Image Information and Television Engineers (ITE) : Standard video
Recommendation ITU-R BT.500–11: Methodology for the subjective assessment of the quality of television pictures (2002)
Hersch, R.D., Chosson, S.: Band Moire Images. Proc. SIGGRAPH 2004, ACM Trans. on Graphics 23(3), 239–248 (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yamada, T., Takahashi, Y. (2012). Use of “Emergable Watermarks” as Copy Indicators for Securing Video Content. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-642-32205-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32204-4
Online ISBN: 978-3-642-32205-1
eBook Packages: Computer ScienceComputer Science (R0)