Skip to main content

Use of “Emergable Watermarks” as Copy Indicators for Securing Video Content

  • Conference paper
  • 2464 Accesses

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7128))

Abstract

We propose using emergable watermarks as copy indicators that become visible in video content that has been copied under designated conditions. A watermark pattern is designed that is sensitive to image processing specific to illegal copying. This is done on the basis of the aliasing effect, which causes image distortion when the re-sampling frequency is low. Watermarks using such patterns are embedded in the original video. They become visible only if the copy had been illegally generated by re-encoding with designated scaling. They show, for example, copy indicators, warning the viewer that the video had been illegally copied, and distort the image quality. Testing of a prototype implementation demonstrated the effectiveness of this method. The peak-signal-to-noise-ratio in watermarked video was adjustable by more than 28 dB. Use of this method should help deter the illegal copying and/or distributing of copyrighted videos.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. George, C., Scerri, J.: Web 2.0 and user-generated content: legal challenges in the new frontier. Journal of Information, Law and Technology 2 (2007)

    Google Scholar 

  2. Bloom, J.A., Cox, I.J., Kalker, T., Linnartz, J.-P.M.G., Miller, M.L., Traw, C.B.S.: Copy protection for DVD video. Proc. IEEE 87(7), 1267–1276 (1999)

    Article  Google Scholar 

  3. Hartung, F., Ramme, F.: Digital rights management and watermarking of multimedia content for M-commerce applications. IEEE Communication Magazine 38(11), 78–84 (2000)

    Article  Google Scholar 

  4. Yamada, T., Gohshi, S., Echizen, I.: Re-shooting prevention based on difference between sensory perceptions of humans and devices. In: Proc. of Int’l Conf. on Image Processing (ICIP 2010), pp. 993–996 (2010)

    Google Scholar 

  5. Cox, I.J., Miller, M.L., Bloom, J.A., Fridrich, J., Kalker, T.: Digital watermarking and steganography, 2nd edn. Morgan Kaufmann (2007)

    Google Scholar 

  6. Wu, et al.: Watermarking for image authentication. In: Proc. of IEEE Int’l Conf. on Image Processing, vol. 2, pp. 437–441 (1998)

    Google Scholar 

  7. Lin, C.Y., Chang, S.F.: A robust image authentication method surviving JPEG lossy compression. In: Proc. SPIE, vol. 3312, pp. 296–307 (1998)

    Google Scholar 

  8. Lin, C.Y., Chang, S.F.: Issues and solutions for authenticating MPEG Video. In: Proc. SPIE, vol. 3657, pp. 54–65 (1999)

    Google Scholar 

  9. Jeong, Y.J., Kim, W.H., Moon, K.S., Kim, J.N.: Implementation of watermark detection system for hardware based video watermark embedder. In: Proc. of Int’l Conf. on Convergence and Hybrid Information Technology, pp. 450–453 (2008)

    Google Scholar 

  10. Atomori, Y., Echizen, I., Dainaka, M., Nakayama, S., Yoshiura, H.: Robust video watermarking based on dual plane correlation for immunity to rotation, scale, translation, and random distortion. Journal of Digital Information Management 6(2), 161–167 (2008)

    Google Scholar 

  11. Yamada, T., Takashima, K., Yoshioka, H.: Development of Transcoder in Conjunction with Video Watermarking to Deter Information Leak. In: de Leon, F., de Carvalho, A.P., et al. (eds.) Distributed Computing and Artificial Intelligence. AISC, vol. 79, pp. 229–236. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  12. van Renesse, R.L.: Paper based document security – a review. In: Proc. of European Conference on Security and Detection (ECOS 1997), vol. (437), pp. 75–80 (1997)

    Google Scholar 

  13. Huang, S., Wu, J.K.: Optical watermarking for printed document authentication. IEEE Trans. on Information Forensics and Security 2(2), 164–173 (2007)

    Article  Google Scholar 

  14. The Institute of Image Information and Television Engineers (ITE) : Standard video

    Google Scholar 

  15. Recommendation ITU-R BT.500–11: Methodology for the subjective assessment of the quality of television pictures (2002)

    Google Scholar 

  16. Hersch, R.D., Chosson, S.: Band Moire Images. Proc. SIGGRAPH 2004, ACM Trans. on Graphics 23(3), 239–248 (2004)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yamada, T., Takahashi, Y. (2012). Use of “Emergable Watermarks” as Copy Indicators for Securing Video Content. In: Shi, Y.Q., Kim, HJ., Perez-Gonzalez, F. (eds) Digital Forensics and Watermarking. IWDW 2011. Lecture Notes in Computer Science, vol 7128. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32205-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32205-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32204-4

  • Online ISBN: 978-3-642-32205-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics