Sunteți pe pagina 1din 5

International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No.

10

A Review of Watermarking Techniques for Copy Protection of Digital Images & Methods
1Dolley Shukla and 2Manisha Sharma 1Shri Shankaracharya College of Engg. & Tech. 2Bhilai Institute of Technology, Durg 1dolleyshukla@yahoo.co.in 2 manishasharma1@rediffmail.com Abstract
Digital watermarking is the process of embedding information into a digital signal, i.e. audio, pictures, video, etc. Embedded marks in the message are generally imperceptible but can be detected or extracted. The embedding takes place by manipulating the content of the digital data, which means the information is not embedded in the frame around the data. If the signal is copied, then the embedded information is also in the copy. By imperceptibly hiding information into the video content it will be possible to prevent copying or playback of such content. So, Watermarking is an emerging technology that is claimed to have an important application in copy protection. A variety of watermarking techniques have been proposed by researchers for the copy-protection. This paper presents an extensive review of the prevailing literature in watermarking for copy protection. This paper discusses overview of different copy protection Methods i.e. Copy Generation Management System (CGMS), Content Scrambling System (CSS), Analog Protection System (APS) used for DVD and also give the comparative analysis. Keywords: Broadcast monitoring, Copy protection, Digital image watermarking, Video.

1. Introduction
With the rapid spread of computer networks and the further progress of multimedia technologies. security and legal issues of copy protection have become more and more important. Digital watermark techniques have been proposed in recent years as one method to protect the copying of digital data [1]- [5]. It is realized by embedding a watermark (e.g. time and date. copyright identifier etc.) directly into digital data with an imperceptible form for human audio/visual systems. ln general a digital watermark technique must satisfy the following two properties [I. 2]. First, the embedded watermark does not distort visually the image and should be perceptually invisible, The second property is that the watermark must be difficult for an attacker to remove. It is also robust against common signal processing and geometric distortion. An image watermarking procedure needs to satisfy the requirement are Transparency & Robustness [6] and the digital video is usually compressed with MPEG and will be stored and distributed in compressed format for video applications such DVD (Digital video Disk) and V-OD (Video on Demand). Therefore , the watermark must be robust to MPEG coding.Therefore the Data Hiding Sub Group (DHSG)[6] which was formed as a subgroup of the Copy Protection Technical working Group (CPTWG) on May 06 1996 , is discussing the generational copy control for "one-copy" of video contents. The goal is to provide a means to allow a consumer to record one copy of a video but prevent additional copies of that copy from being made. It is considered to be achieved by the function of multiple watermarking [8].

2. Copy Protection
Digital watermarks can be used to enable copy control devices. By imperceptibly hiding information into the video content it will be possible to prevent copying or playback of such content. So, Watermarking is an emerging technology that is claimed to have an important application in copy protection Copy protection attempts to find ways, which limits the access to copyrighted material and/or inhibit the copy process itself. Examples of copy protection include encrypted digital TV broadcast, access controls to copyrighted software through the use of license servers and technical copy protection mechanisms on the media. A recent example is the copy protection mechanism on DVDs. However, copy protection is very difficult to 31

International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 achieve in open systems, as recent incidents (like the DVD hack - DeCss) show. [9]

3. Overview of Copy protection Methods


A digital watermark is an unnoticeable signal added to digital data, known as cover work, which can possibly be identified at a later stage for copy protection identification, ownership proof, and the like. Digital watermarking can be categorized into image watermarking, video watermarking and audio watermarking depending upon the range of application[10]. Contemporary digital watermarking schemes chiefly target image and video copy-protection. The watermark comprises of information regarding the rules of usage and copying which the content owner desires to enforce. It will commonly be undemanding rules like this content may not be copied, or this content may be copied, but no subsequent copies may be made of that copy. watermark can be either directly inserted in the raw video data or integrated during encoding process or implemented after compressing the video data. Now we shall briefly discuss some common video watermarking techniques

Copy Generation Management System (CGMS) is a system where two bits are embedded in the compressed video file on the DVD. When a copying device equipped with CGMS protection attempts to copy a disc whose bits correspond to a no copy state, the device cancels the burn [11]. Content Scrambling System (CSS) was the original copy protection method used on DVDs. It implements a series of decryption keys: authentication, session, player, disk, sector, and title. In general, each key is used to decode another in a chain of decryptions leading to the playback of the DVD video [12]. The application of CSS is similar in both a PC DVD-ROM drive and a standalone DVD player, although an additional authentication step must be performed in the PC in order to ensure CSS is recognized. The weakness of CSS lies in its simple 40-bit encryption (relative to todays typical 128- bit encryption), which can be cracked by brute force, meaning attempting every possible decryption key until the correct one is found. CSSs effectiveness was shortlived; a small group of Norwegian hackers created DeCSS in October of 1999 [13] to break the code and give pirates across the globe the means to copy commercial DVD movies to no end. The movie industry was in need of a new, stronger encryption. Analog Protection System (APS), Analog Copy Protection (ACP), developed by Macrovision originally to prevent the copying of videocassettes, now is applied to digital devices to prevent digital-toanalog reproduction. The DVD player incorporates a modified digital-to-analog converter, which, in addition to sending the video, creates pulses that disrupt the automatic gain control (AGC) [11]. If a second device (VCR or on-the-fly DVD recorder) is used to record this analog stream, the end result is severely degraded material. This copy protection method proves effective for most analog applications, as shown in Table 1. Unfortunately, the masses of DVD piracy are performed by digital-to-digital reproduction, for which APS is of no use. Again, a stronger method is sought.

4. Comparative Analysis of recent researches


Watermarking digital media has received a great interest in the research community. In this section we have presented a comparative analysis of literatures provided by researchers in watermarking for copy protection. Most copy watermarking schemes focus on image and video watermarking. A digital watermark is an unnoticeable signal added to digital data, known as cover work, which can possibly be identified at a later stage for copy protection identification, ownership proof, and the like. Contemporary digital watermarking schemes chiefly target image and video copy protection. The watermark comprises of information regarding the rules of usage and copying which the content owner desires to enforce. These will commonly be undemanding rules like this content may not be copied, or this content may be copied, but no subsequent copies may be made of that copy. For copy protection several methods are proposed. Cox et al described the copy protection system currently under consideration for DVD. This system broadly tries to prevent illicit copies from being made from either the analog or digital I/O channels of DVD recorders[14]. An analog copy-protection system is utilized to protect the NTSC/PAL output channel by preventing copies to Video Hollywood studio (VHS). The digital transmission of content is protected by a robust encryption protocol between two communicating devices. Watermarking is used to encode copy control information retrievable from both digital and analog signals. Hence, such embedded signals avoid the need for 32

International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 metadata to be carried in either the digital or analog domains. F. G. Depovere, discussed the various issues that play a role in designing a copy-protection system for digital versatile disk (DVD) video as perceived by Millennium, one of the two contenders in the DVD-video copyprotection standardization activity. It has presented the Millennium watermark system, the systems proposed for DVD video copy protection by Philips, Macrovision and Digimarc[15]. They also address some specific system aspects, such as watermark detector location and copy generation control. The DVD copy protection problem cannot be solved by encryption alone. Digital watermarking is needed to prevent copy protection being circumvented by noncompliant devices. It describes the Millennium watermark system as proposed for DVD copy protection purposes, and it illustrate how the basic requirements for that application are met. Ton Kalker discussed that watermarking is an important enabling technology for copy protection or broadcast monitoring of video[16]. A watermarking scheme that meets the requirements for these applications has been introduced. It discusses about the main requirement for watermarking solution for DVD copy protection. Yeong Kyeong Seong suggested a hard disk drive embedded digital satellite receiver with a scene change detector for video indexing[17]. This paper discusses the implementation of a scene change detection algorithm in the compressed domain for low computing power systems. This receiver can store, retrieve and manage the broadcast data by implementing an interface between the conventional digital satellite receiver and digital storage media. In addition this receiver gives users an ability to search the scene change position by implementing a scene change detection algorithm. The detected temporal video segments are stored in the HDD and retrieved when users want. User can obtain more information for efficient video retrieval, using this proposed system. Yeong et al proposed another watermarking method based on scene segmentation for copy protection in the hard disk drive embedded digital broadcast receivers[18]. In this, initially video sequence is segmented as scenes using the macroblock types of B-picture in the MPEG compressed domain. Second, for each scene, different embedding parameter is determined from the image complexity and motion vector amplitude. For copy protection, copy control watermark information is embedded in the DCT Domain content whether the content is copyrighted or not. G. Boatoet et al shows a major limitation of some recently proposed asymmetric watermarking techniques based on linear algebra lies in the strong dependence of the watermark on the original image[19]. Alper Koz et al focused on a watermarking method for free-view video [20 ]. The watermarking is embedded into every frame of multiple views by exploiting the spatial masking properties of the human visual system.

5. Comparative analysis in tabular form


Table 1 : Comparative analysis of suggested methods for copy protection using watermarking. S.No. 1. Author I.J.Cox [14] Application Area DVD 1. 2. 3. 2. Ton Kalker [15] Video or Broadcast Data Remarks Improve the protection provided by encryption protocol. Reduce the value of illegal unencrypted copies when they are made by making them unplayable on compliant devices. This paper gives the main requirement for a watermarking olution for DVD copy protection. Year 1999

1. Difference of still Image and Video Watermarking 2. In video,due to the sheer volume of data & interlacing structure, the Quality of the content will reduce & the attack will not remove by consumer.

1999

33

International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 3. Ton kalker, Maurice Maes [16] DVD 1. DVD copy protection problem can not be solved by encryption alone. Authentication & sessionkey generation mechanism is needed for all interfaces. Uses correlation method for embedding & detection. Watermark detector should be included in the playback drive. System prevents the Local scrambling or bit inversion attack Implemented a Scene change detection algorithm in compressed domain for low. computing power system. 2000

2. 3. 4. Broadcasting 1.

4.

Y. K. Seong, Y. H. Choi, J. A. Park, & T. S. Choi[17] Yeong Kyeong Seong, YoonHeeChoi, [18] Fontanari, F. G. B. De Natale , and G. Boato[19] 7 Alper koz,Cigal [20]

2002

5.

Digital Broadcast Receiver Video

1. 2. 3.

Video is segmented into different scenes. Encoded by using DCT. Uses scene-change detection algorithm.

2004

6.

1. Scheme is based on Linear Algebra, which is proven to be secure under protection attacks.

2006

Video or Broadcasting

1. Application is emerged as Free-view TV. 2. Image based rendering operation is performed. 3. Frame of multiple views are used. 4. Camera position & homography estimation methods proposed.

2010

are

5. Conclusion
Even though copy protection has received ample attention in the standardization of digital video in the past five years, several issues have not yet been fully resolved. It may be unlikely that a bullet-proof solution will ever be found, but the discussions are converging on what technical mechanisms should be involved and against what these can protect. Watermarking for copy protection is a new and emerging area of research. It mainly deals with adding hidden messages or copyright notices in digital video. This paper reviews various copy protection literatures for digital image and video watermarking. This paper also discusses about various techniques for copy protection . As a result, video watermarking is a potential approach for protection of ownership rights on digital video.

References
[1] [2] [3] [4] [5] Lu, A., Gruhl, D., N. Morimoto, N., and Bender, U., (1996), "Techniques for data hiding," Journal of IBM Systems, vol 35(3/4), p p.313-336. Cox, I.J., Killian,J., Leight.on., T., and Shamoon, T., (1997), Secure spread spectrum watermarking for multimedia." IEEE Trans. Image processing vol 6, no.12. Langelaar.,GC., Bieniond,J., and Lagendijk,,R.L., (1997), Real-time labeling methods for MPEG compressed video", Proceeding of 18th Symp. on Inf. Theory, Girod, G.., and Aartung, F., (1997), Digital watermarkitig of MPEG 2 coded video in the bitstream domain.", IEEE Proceeding ICASSP'97. Vol 4, pp.2621-2624. Miyazaki, A., Inoue, H., and Katsura, T., (1998), "A digital watermarking for image signals using a controlled quantization method of the wavelet coefficients.", Intformation Technology Proceedng Conference on Circuits /Systems computer and Communication, vol.1. pp.11:3-116. Choi, T.S., Choi, ,Y,.H., and, Seong, Y. K.., (2002), Design and implementation of hard disk drive embedded digital satellite receiver with file management, IEEE Transactions on Consumer Electronics, Vol.48, No.1, pp.125-130. Wei Li, Xiaoqiang Li, and, Xiangyang Xue, (2003), "An Optimized Multi-bits Blind Watermarking Scheme" Lecture Notes in Computer Science, Vol. 2836, pp.360-369 . Gwenael, D., and Jean-Luc, D., (2003), A guide tour of video watermarking , Signal Processing Image Communication, Vol. 18, No. 4, Pp. 263-282. Hernandez, J.R., Perez-Gonzalez, F., (1999), Statistical Analysis of watermarking schemes for copyright 34

[6]

[7] [8] [9]

International Journal of Computational Intelligence and Information Security, October 2011 Vol. 2, No. 10 protection of images", Proceedings of the IEEE, Vol. 87, No. 7, pp. 1142 1166. [10] .Jayamalar, T., Radha2, V., (2010), Sevey on Digital Video Watermarking Techniques and Attacks on Watermarks , International Journal of Engineering Science and Technology , Vol. 2(12), pp. 6963-6967. [11] Macrovision Corporation, (2003), Preserving an Effective DVD Copy Protection System [7] Wikipedia contributors, Wikipedia: The Free Encyclopedia, (2006), CGMS-A, http://en.wikipedia.org/wiki/CGMS-A. [12] Kresden, G.., Carnegie Mellon University, (2000), Content Scrambling System (CSS): Introduction, http://www.cs.cmu.edu/~dst/DeCSS/Kesden/index.html. [13] Wikipedia contributors, (2006), Wikipedia: The Free Encyclopedia,Content-scrambling system, http://en.wikipedia.org/wiki/Content-scrambling _system. [14] Traw, C.B.S., Cox, I.J., Bloom, J.A., Linnartz, J. -P. M. G., Miller, M.L., and Kalker, T., (1999), Copy protection for DVD video, IEEE Proceedings , Vol. 87, No. 7, pp. 1267-1276. [15] Depovere, F.G ., Haitsma, J., Linnartz, J. -P. M. G.., Talstra, J., Maes M., and Kalker, T., (2000), Digital watermarking for DVD video copy protection, IEEE Signal Processing Magazine, Vol. 17, No. 5, pp. 47-57. . [16] Kalker, T., (1999), System issues in digital image and video watermarking for copy protection, IEEE International Conference on Multimedia Computing and Systems, Vol.1, pp.562-567. [17] Park, J.A., Y. H. Choi, Y.H., Seong,Y..K., and Choi, T.S., (2002), "A hard disk drive embedded digital satellite receiver with scene change detector for video indexing" , IEEE Transactions on Consumer Electronics, Vol. 48, No. 3, pp. 776-782. [18] Tae-Sun Choi , Yoon-Hee Choi, and Yeong Kyeong Seong, (2004), Scene-Based Watermarking method for Copy-Protection using Image complexity and motion vector amplitude, IEEE Proceedings , Vol.3, ISSN: 1520-6149 , pp. 409-12. [19] Fontanari, C., De Natale, F.G.B., and Boato, G.., (2006), An Improved Asymmetric Watermarking Scheme Suitable for Copy Protection, IEEE Transactions on Signal Processing, Vol. 54, No. 7,pp. 28332834. [20] Aydn Alatan, A., Alper Koz, and Cevahir Cigla, (2010), Watermarking of Free-view Video IEEE Transactions on Image Processing, Vol.19, NO. 7, pp. 1785-1779.

35

S-ar putea să vă placă și