Documente Academic
Documente Profesional
Documente Cultură
10
A Review of Watermarking Techniques for Copy Protection of Digital Images & Methods
1Dolley Shukla and 2Manisha Sharma 1Shri Shankaracharya College of Engg. & Tech. 2Bhilai Institute of Technology, Durg 1dolleyshukla@yahoo.co.in 2 manishasharma1@rediffmail.com Abstract
Digital watermarking is the process of embedding information into a digital signal, i.e. audio, pictures, video, etc. Embedded marks in the message are generally imperceptible but can be detected or extracted. The embedding takes place by manipulating the content of the digital data, which means the information is not embedded in the frame around the data. If the signal is copied, then the embedded information is also in the copy. By imperceptibly hiding information into the video content it will be possible to prevent copying or playback of such content. So, Watermarking is an emerging technology that is claimed to have an important application in copy protection. A variety of watermarking techniques have been proposed by researchers for the copy-protection. This paper presents an extensive review of the prevailing literature in watermarking for copy protection. This paper discusses overview of different copy protection Methods i.e. Copy Generation Management System (CGMS), Content Scrambling System (CSS), Analog Protection System (APS) used for DVD and also give the comparative analysis. Keywords: Broadcast monitoring, Copy protection, Digital image watermarking, Video.
1. Introduction
With the rapid spread of computer networks and the further progress of multimedia technologies. security and legal issues of copy protection have become more and more important. Digital watermark techniques have been proposed in recent years as one method to protect the copying of digital data [1]- [5]. It is realized by embedding a watermark (e.g. time and date. copyright identifier etc.) directly into digital data with an imperceptible form for human audio/visual systems. ln general a digital watermark technique must satisfy the following two properties [I. 2]. First, the embedded watermark does not distort visually the image and should be perceptually invisible, The second property is that the watermark must be difficult for an attacker to remove. It is also robust against common signal processing and geometric distortion. An image watermarking procedure needs to satisfy the requirement are Transparency & Robustness [6] and the digital video is usually compressed with MPEG and will be stored and distributed in compressed format for video applications such DVD (Digital video Disk) and V-OD (Video on Demand). Therefore , the watermark must be robust to MPEG coding.Therefore the Data Hiding Sub Group (DHSG)[6] which was formed as a subgroup of the Copy Protection Technical working Group (CPTWG) on May 06 1996 , is discussing the generational copy control for "one-copy" of video contents. The goal is to provide a means to allow a consumer to record one copy of a video but prevent additional copies of that copy from being made. It is considered to be achieved by the function of multiple watermarking [8].
2. Copy Protection
Digital watermarks can be used to enable copy control devices. By imperceptibly hiding information into the video content it will be possible to prevent copying or playback of such content. So, Watermarking is an emerging technology that is claimed to have an important application in copy protection Copy protection attempts to find ways, which limits the access to copyrighted material and/or inhibit the copy process itself. Examples of copy protection include encrypted digital TV broadcast, access controls to copyrighted software through the use of license servers and technical copy protection mechanisms on the media. A recent example is the copy protection mechanism on DVDs. However, copy protection is very difficult to 31
International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 achieve in open systems, as recent incidents (like the DVD hack - DeCss) show. [9]
Copy Generation Management System (CGMS) is a system where two bits are embedded in the compressed video file on the DVD. When a copying device equipped with CGMS protection attempts to copy a disc whose bits correspond to a no copy state, the device cancels the burn [11]. Content Scrambling System (CSS) was the original copy protection method used on DVDs. It implements a series of decryption keys: authentication, session, player, disk, sector, and title. In general, each key is used to decode another in a chain of decryptions leading to the playback of the DVD video [12]. The application of CSS is similar in both a PC DVD-ROM drive and a standalone DVD player, although an additional authentication step must be performed in the PC in order to ensure CSS is recognized. The weakness of CSS lies in its simple 40-bit encryption (relative to todays typical 128- bit encryption), which can be cracked by brute force, meaning attempting every possible decryption key until the correct one is found. CSSs effectiveness was shortlived; a small group of Norwegian hackers created DeCSS in October of 1999 [13] to break the code and give pirates across the globe the means to copy commercial DVD movies to no end. The movie industry was in need of a new, stronger encryption. Analog Protection System (APS), Analog Copy Protection (ACP), developed by Macrovision originally to prevent the copying of videocassettes, now is applied to digital devices to prevent digital-toanalog reproduction. The DVD player incorporates a modified digital-to-analog converter, which, in addition to sending the video, creates pulses that disrupt the automatic gain control (AGC) [11]. If a second device (VCR or on-the-fly DVD recorder) is used to record this analog stream, the end result is severely degraded material. This copy protection method proves effective for most analog applications, as shown in Table 1. Unfortunately, the masses of DVD piracy are performed by digital-to-digital reproduction, for which APS is of no use. Again, a stronger method is sought.
International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 metadata to be carried in either the digital or analog domains. F. G. Depovere, discussed the various issues that play a role in designing a copy-protection system for digital versatile disk (DVD) video as perceived by Millennium, one of the two contenders in the DVD-video copyprotection standardization activity. It has presented the Millennium watermark system, the systems proposed for DVD video copy protection by Philips, Macrovision and Digimarc[15]. They also address some specific system aspects, such as watermark detector location and copy generation control. The DVD copy protection problem cannot be solved by encryption alone. Digital watermarking is needed to prevent copy protection being circumvented by noncompliant devices. It describes the Millennium watermark system as proposed for DVD copy protection purposes, and it illustrate how the basic requirements for that application are met. Ton Kalker discussed that watermarking is an important enabling technology for copy protection or broadcast monitoring of video[16]. A watermarking scheme that meets the requirements for these applications has been introduced. It discusses about the main requirement for watermarking solution for DVD copy protection. Yeong Kyeong Seong suggested a hard disk drive embedded digital satellite receiver with a scene change detector for video indexing[17]. This paper discusses the implementation of a scene change detection algorithm in the compressed domain for low computing power systems. This receiver can store, retrieve and manage the broadcast data by implementing an interface between the conventional digital satellite receiver and digital storage media. In addition this receiver gives users an ability to search the scene change position by implementing a scene change detection algorithm. The detected temporal video segments are stored in the HDD and retrieved when users want. User can obtain more information for efficient video retrieval, using this proposed system. Yeong et al proposed another watermarking method based on scene segmentation for copy protection in the hard disk drive embedded digital broadcast receivers[18]. In this, initially video sequence is segmented as scenes using the macroblock types of B-picture in the MPEG compressed domain. Second, for each scene, different embedding parameter is determined from the image complexity and motion vector amplitude. For copy protection, copy control watermark information is embedded in the DCT Domain content whether the content is copyrighted or not. G. Boatoet et al shows a major limitation of some recently proposed asymmetric watermarking techniques based on linear algebra lies in the strong dependence of the watermark on the original image[19]. Alper Koz et al focused on a watermarking method for free-view video [20 ]. The watermarking is embedded into every frame of multiple views by exploiting the spatial masking properties of the human visual system.
1. Difference of still Image and Video Watermarking 2. In video,due to the sheer volume of data & interlacing structure, the Quality of the content will reduce & the attack will not remove by consumer.
1999
33
International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 3. Ton kalker, Maurice Maes [16] DVD 1. DVD copy protection problem can not be solved by encryption alone. Authentication & sessionkey generation mechanism is needed for all interfaces. Uses correlation method for embedding & detection. Watermark detector should be included in the playback drive. System prevents the Local scrambling or bit inversion attack Implemented a Scene change detection algorithm in compressed domain for low. computing power system. 2000
2. 3. 4. Broadcasting 1.
4.
Y. K. Seong, Y. H. Choi, J. A. Park, & T. S. Choi[17] Yeong Kyeong Seong, YoonHeeChoi, [18] Fontanari, F. G. B. De Natale , and G. Boato[19] 7 Alper koz,Cigal [20]
2002
5.
1. 2. 3.
Video is segmented into different scenes. Encoded by using DCT. Uses scene-change detection algorithm.
2004
6.
1. Scheme is based on Linear Algebra, which is proven to be secure under protection attacks.
2006
Video or Broadcasting
1. Application is emerged as Free-view TV. 2. Image based rendering operation is performed. 3. Frame of multiple views are used. 4. Camera position & homography estimation methods proposed.
2010
are
5. Conclusion
Even though copy protection has received ample attention in the standardization of digital video in the past five years, several issues have not yet been fully resolved. It may be unlikely that a bullet-proof solution will ever be found, but the discussions are converging on what technical mechanisms should be involved and against what these can protect. Watermarking for copy protection is a new and emerging area of research. It mainly deals with adding hidden messages or copyright notices in digital video. This paper reviews various copy protection literatures for digital image and video watermarking. This paper also discusses about various techniques for copy protection . As a result, video watermarking is a potential approach for protection of ownership rights on digital video.
References
[1] [2] [3] [4] [5] Lu, A., Gruhl, D., N. Morimoto, N., and Bender, U., (1996), "Techniques for data hiding," Journal of IBM Systems, vol 35(3/4), p p.313-336. Cox, I.J., Killian,J., Leight.on., T., and Shamoon, T., (1997), Secure spread spectrum watermarking for multimedia." IEEE Trans. Image processing vol 6, no.12. Langelaar.,GC., Bieniond,J., and Lagendijk,,R.L., (1997), Real-time labeling methods for MPEG compressed video", Proceeding of 18th Symp. on Inf. Theory, Girod, G.., and Aartung, F., (1997), Digital watermarkitig of MPEG 2 coded video in the bitstream domain.", IEEE Proceeding ICASSP'97. Vol 4, pp.2621-2624. Miyazaki, A., Inoue, H., and Katsura, T., (1998), "A digital watermarking for image signals using a controlled quantization method of the wavelet coefficients.", Intformation Technology Proceedng Conference on Circuits /Systems computer and Communication, vol.1. pp.11:3-116. Choi, T.S., Choi, ,Y,.H., and, Seong, Y. K.., (2002), Design and implementation of hard disk drive embedded digital satellite receiver with file management, IEEE Transactions on Consumer Electronics, Vol.48, No.1, pp.125-130. Wei Li, Xiaoqiang Li, and, Xiangyang Xue, (2003), "An Optimized Multi-bits Blind Watermarking Scheme" Lecture Notes in Computer Science, Vol. 2836, pp.360-369 . Gwenael, D., and Jean-Luc, D., (2003), A guide tour of video watermarking , Signal Processing Image Communication, Vol. 18, No. 4, Pp. 263-282. Hernandez, J.R., Perez-Gonzalez, F., (1999), Statistical Analysis of watermarking schemes for copyright 34
[6]
International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 protection of images", Proceedings of the IEEE, Vol. 87, No. 7, pp. 1142 1166. [10] .Jayamalar, T., Radha2, V., (2010), Sevey on Digital Video Watermarking Techniques and Attacks on Watermarks , International Journal of Engineering Science and Technology , Vol. 2(12), pp. 6963-6967. [11] Macrovision Corporation, (2003), Preserving an Effective DVD Copy Protection System [7] Wikipedia contributors, Wikipedia: The Free Encyclopedia, (2006), CGMS-A, http://en.wikipedia.org/wiki/CGMS-A. [12] Kresden, G.., Carnegie Mellon University, (2000), Content Scrambling System (CSS): Introduction, http://www.cs.cmu.edu/~dst/DeCSS/Kesden/index.html. [13] Wikipedia contributors, (2006), Wikipedia: The Free Encyclopedia,Content-scrambling system, http://en.wikipedia.org/wiki/Content-scrambling _system. [14] Traw, C.B.S., Cox, I.J., Bloom, J.A., Linnartz, J. -P. M. G., Miller, M.L., and Kalker, T., (1999), Copy protection for DVD video, IEEE Proceedings , Vol. 87, No. 7, pp. 1267-1276. [15] Depovere, F.G ., Haitsma, J., Linnartz, J. -P. M. G.., Talstra, J., Maes M., and Kalker, T., (2000), Digital watermarking for DVD video copy protection, IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 47-57. . [16] Kalker, T., (1999), System issues in digital image and video watermarking for copy protection, IEEE International Conference on Multimedia Computing and Systems, Vol.1, pp.562-567. [17] Park, J.A., Y. H. Choi, Y.H., Seong,Y..K., and Choi, T.S., (2002), "A hard disk drive embedded digital satellite receiver with scene change detector for video indexing" , IEEE Transactions on Consumer Electronics, Vol. 48, No. 3, pp. 776-782. [18] Tae-Sun Choi , Yoon-Hee Choi, and Yeong Kyeong Seong, (2004), Scene-Based Watermarking method for Copy-Protection using Image complexity and motion vector amplitude, IEEE Proceedings , Vol.3, ISSN: 1520-6149 , pp. 409-12. [19] Fontanari, C., De Natale, F.G.B., and Boato, G.., (2006), An Improved Asymmetric Watermarking Scheme Suitable for Copy Protection, IEEE Transactions on Signal Processing, Vol. 54, No. 7,pp. 28332834. [20] Aydn Alatan, A., Alper Koz, and Cevahir Cigla, (2010), Watermarking of Free-view Video IEEE Transactions on Image Processing, Vol.19, NO. 7, pp. 1785-1779.
35