(cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:5)(cid:6)(cid:7) (cid:8)(cid:5)(cid:4)(cid:9)(cid:10)(cid:11)(cid:5)(cid:10)(cid:12)(cid:2)(cid:13)(cid:3) (cid:14)(cid:15)(cid:10)(cid:7) (cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:5)(cid:6)(cid:7) (cid:16)(cid:9)(cid:17)(cid:2)(cid:5) Juergen Seitz University of Cooperative Education Heidenheim, Germany (cid:18)(cid:13)(cid:14)(cid:15)(cid:10)(cid:11)(cid:5)(cid:4)(cid:2)(cid:15)(cid:13)(cid:7) (cid:19)(cid:20)(cid:2)(cid:9)(cid:13)(cid:20)(cid:9)(cid:7) (cid:21)(cid:22)(cid:23)(cid:6)(cid:2)(cid:24)(cid:25)(cid:2)(cid:13)(cid:3) Hershey • London • Melbourne • Singapore Acquisitions Editor: Renée Davies Development Editor: Kristin Roth Senior Managing Editor: Amanda Appicello Managing Editor: Jennifer Neidig Copy Editor: Joyce Li Typesetter: Cindy Consonery Cover Design: Lisa Tosheff Printed at: Yurchak Printing Inc. Published in the United States of America by Information Science Publishing (an imprint of Idea Group Inc.) 701 E. Chocolate Avenue, Suite 200 Hershey PA 17033 Tel: 717-533-8845 Fax: 717-533-8661 E-mail: [email protected] Web site: http://www.idea-group.com and in the United Kingdom by Information Science Publishing (an imprint of Idea Group Inc.) 3 Henrietta Street Covent Garden London WC2E 8LU Tel: 44 20 7240 0856 Fax: 44 20 7379 3313 Web site: http://www.eurospan.co.uk Copyright © 2005 by Idea Group Inc. All rights reserved. No part of this book may be reproduced, stored or distributed in any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher. Product or company names used in this book are for identification purposes only. Inclusion of the names of the products or companies does not indicate a claim of ownership by IGI of the trademark or registered trademark. Library of Congress Cataloging-in-Publication Data Digital watermarking for digital media / Juergen Seitz, editor. p. cm. Summary: "The book discusses new aspects of digital watermarking in a worldwide context"--Provided by publisher. Includes bibliographical references and index. ISBN 1-59140-518-1 (h/c) -- ISBN 1-59140-519-X (s/c) -- ISBN 1-59140-520-3 (ebook) 1. Computer security. 2. Digital watermarking. 3. Multimedia systems--Security measures. 4. Intellectual property. I. Seitz, Juergen, 1968- QA76.9.A25D56 2005 005.8'2--dc22 2004029852 British Cataloguing in Publication Data A Cataloguing in Publication record for this book is available from the British Library. All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the authors, but not necessarily of the publisher. (cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:5)(cid:6)(cid:7)(cid:8)(cid:5)(cid:4)(cid:9)(cid:10)(cid:11)(cid:5)(cid:10)(cid:12)(cid:2)(cid:13)(cid:3)(cid:7)(cid:14)(cid:15)(cid:10) (cid:1)(cid:2)(cid:3)(cid:2)(cid:4)(cid:5)(cid:6)(cid:7) (cid:16)(cid:9)(cid:17)(cid:2)(cid:5) (cid:26)(cid:5)(cid:23)(cid:6)(cid:9)(cid:7)(cid:15)(cid:14)(cid:7)(cid:27)(cid:15)(cid:13)(cid:4)(cid:9)(cid:13)(cid:4)(cid:24) Foreword................................................................................................ v Preface.................................................................................................. vi Chapter I. Digital Watermarking: An Introduction........................ 1 Juergen Seitz, University of Cooperative Education Heidenheim, Germany Tino Jahnke, University of Cooperative Education Heidenheim, Germany Chapter II. Digital Watermarking Schemes for Multimedia Authentication..................................................................................... 30 Chang-Tsun Li, University of Warwick, UK Chapter III. Digital Watermarking for Multimedia Transaction Tracking............................................................................................... 52 Dan Yu, Nanyang Technological University, Singapore Farook Sattar, Nanyang Technological University, Singapore Chapter IV. A New Public-Key Algorithm for Watermarking of Digital Images .................................................................................... 87 Eberhard Stickel, Hochschule der Sparkassen-Finanzgruppe, University of Applied Sciences Bonn GmbH, Germany Chapter V. Geometric Distortions Correction Using Image Moment in Image Watermarking..................................................101 Zhang Li, Shenzen University, China Sam Kwong, City University of Hong Kong, SAR China Chapter VI. Audio Watermarking: Requirements, Algorithms, and Benchmarking ...........................................................................135 Nedeljko Cvejic, University of Oulu, Finland Tapio Seppänen, University of Oulu, Finland Chapter VII. MPEG Standards and Watermarking Technologies .....................................................................................182 Jong-Nam Kim, Pukyong University, Republic of Korea Byung-Ha Ahn, Gwangju Institute of Science and Technology (GIST), Republic of Korea Chapter VIII. Time-Variant Watermarks for Digital Videos: An MPEG-Based Approach ...........................................................215 Ernst L. Leiss, University of Houston, USA Chapter IX. Active Watermarking System: Protection of Digital Media ...................................................................................233 Alexander P. Pons, University of Miami, USA Hassan Aljifri, UAE Offsets Group, USA About the Authors............................................................................254 Index ..................................................................................................259 v (cid:28)(cid:15)(cid:10)(cid:9)(cid:29)(cid:15)(cid:10)(cid:17) Digital watermarking is an important topic because of the many illegal copies of images, music titles, and video films. This is strengthened by the digitalization of media assets, the rapid growth of the Internet, and the speed of file trans- fers. Therefore, it is necessary to have mechanisms to protect these digital assets and associated rights. This book gives an overview on storage formats of different media types, data compression, and mechanisms and techniques to protect these media types. This book is an effort to give a comprehensive overview on different aspects of media asset and digital rights management. The book aims to provide relevant theoretical frameworks and the latest research findings in the area. It is written for students, researchers, and professionals who want to improve their under- standing of the role of digital watermarking to protect media assets. Dr. Juergen Seitz University of Cooperative Education Heidenheim, Germany vi (cid:21)(cid:10)(cid:9)(cid:14)(cid:5)(cid:20)(cid:9) Digital media, like audio, video, images, and other multimedia documents, can be protected against copyright infringements with invisible, integrated patterns. Such methods are based on steganography and digital watermarking techniques. Most watermarks are inserted as a plain-bit or adjusted digital signal using a key-based embedding algorithm. The embedded information is hidden (in low- value bits or least significant bits of picture pixels, frequency, or other value domains) and linked inseparably with the source data structure. For the optimal watermarking application a trade-off between competing criteria such as ro- bustness, non-perceptibility, non-detectability, and security have to be made. Most watermarking algorithms are not resistant to all attacks and even friendly attacks such as file and data modifications can easily destroy the watermark. The features of the digital world lead to economical chances such as cheap distribution and also to serious risks in simplifying unauthorized copying and distribution (Rosenblatt, Trippe, & Mooney, 2002). In order to solve intellectual property problems of the digital age, two basic procedures are used: “buy and drop,” linked to the destruction of various peer-to-peer solutions and “subpoena and fear,” as the creation of non-natural social fear by specific legislations. Although customers around the world are willing to buy digital products over networks, the industry is still using conventional procedures to push such a decisive customer impulse back into existing and conventional markets. The importance and the supposed economical thread for copyright holders are clarified by initiatives of the entertainment industry, such as VIVA (Visual Identity Verification Auditor) (VIVA, n.d.) and SDMI (Secure Digital Music Initiative) (SDMI, n.d.). Although distributors and artists already recognize the advan- tages in making their material available online, they will not go further into the online business until their content can be protected by technical and wide law regulations. As new intellectual property changes became new European law in 2003 and begin to fit the proposals of the World Intellectual Property Organi- vii zation (WIPO), political signals, which prove their importance, were set. There- fore, the features of the digital world lead to economical chances as well as to serious problems in simplifying unauthorized copying and distribution. Digital watermarking is a possibility to interface and close the gap between copyrights and digital distribution. This book will take the reader through a series of discussions that describe, analyze, explain, and hypothesize about digital watermarking technology and its usage. In Chapter I, Digital Watermarking: An Introduction, Tino Jahnke and I give an overview on the methodology of digital watermarking, as well as on require- ments of applications, applications, and a categorization of attacks on digital watermarks. There is also a short summary of the historical development of digital watermarking technology. Activities, initiatives, and projects of different associations and interest groups are discussed. The main focus of Chapter II, Digital Watermarking Schemes for Multime- dia Authentication, written by Chang-Tsun Li, is on multimedia data authenti- cation. The technical aspects of security, resolution of tamper localization, and embedding distortion are explained. Fragile, semi-fragile, and reversible schemes are the three main categories of watermarking approaches to the issues and challenges that are presented. Merits and limitations of the specific schemes are compared and discussed. Dan Yu and Farook Sattar focus in Chapter III, Digital Watermarking for Multimedia Transaction Tracking, on the issue of transaction tracking in mul- timedia distribution applications through digital watermarking technology. An approach is proposed that can overcome the problems of existing watermarking schemes. In the absence of the original data, watermark, embedding locations, and strengths, the watermarking scheme is introduced for efficient watermark extraction with some side information. The robustness of the proposed scheme is discussed. In Chapter IV, A New Public-Key Algorithm for Watermarking of Digital Images, Eberhard Stickel presents a two-dimensional public-key algorithm that is based on a one-time digital signature scheme in non-abelian groups. The public key is certified by a trusted third party. Authenticity may be verified by anybody who knows the certified public key. The approach is discussed in rela- tion to images made by surveillance cameras of automatic teller machines (ATMs) in financial institutions. Zhang Li and Sam Kwong present in Chapter V, Geometric Distortions Cor- rection Using Image Moment in Image Watermarking, a method for detect- ing and recovering geometrical attacks, such as rotation, scaling, and transla- tion, by using geometric moments of the original image. The moment informa- tion can be used as a preprocess of the extraction process. Different types of watermarking techniques are analyzed. viii The main focus of Chapter VI, Audio Watermarking: Requirements, Algo- rithms, and Benchmarking, by Nedeljko Cvejic and Tapio Seppänen, is on the usage of digital watermarking for audio data. Audio watermarking algorithms are characterized. Signal modifications that are usually used to distort embed- ded watermarks and to prevent detection of hidden data are presented. Re- cently developed and future applications areas are listed. Jong-Nam Kim and Byung-Ha Ahn introduce in Chapter VII, MPEG Standards and Watermarking Technologies, watermarking technologies of MPEG stan- dards. A framework of watermarking technology for intellectual property pro- tection is presented as well as an overview of MPEG-2/4, IPMP standard of MPEG-2/4, and watermarking technologies of MPEG-2/4 IPMP. The concept of IPMP and required technical items are summarized. MPEG-21 and its part 11, PAT (Persistent Association Technologies) methodologies, requirements, and evaluation methods are described. Future trends of MPEG-related watermarking technologies and requirements are discussed. Ernst Leiss outlines in Chapter VIII, Time-Variant Watermarks for Digital Videos: An MPEG-Based Approach, an approach that permits a significant increase of the amount of information that can be accommodated in a water- mark. The approach is formulated assuming the video is represented in an MPEG format. Implementation issues of time-variant watermarks are discussed with emphasis on defeating attacks using filtering, cropping, resizing, and other stan- dard methods used to defeat watermarks, such as changing existing frames, as well as new attacks, such as removing, repeating, or permuting frames. Finally, Alexander P. Pons and Hassan Aljifri present in Chapter IX, Active Watermarking System: Protection of Digital Media, a novel approach that combines the reactive rule-based scheme of an active database management system with the technology of digital watermarking to automatically protect digital data. The integration of these two technologies provides a powerful mechanism for protecting digital data in a consistent and formal manner. References Rosenblatt, B., Trippe, B., & Mooney, S. (2002). Digital rights management— Business and technology. New York: M&T Books. SDMI. (n.d.). Retrieved June 4, 2004, from http://www.sdmi.org VIVA. (n.d.). Retrieved June 4, 2004, from http://www.intec.rug.ac.be/Re- search/Groups/hfhsdesign/viva/ ix (cid:30)(cid:20)(cid:12)(cid:13)(cid:15)(cid:29)(cid:6)(cid:9)(cid:17)(cid:3)(cid:11)(cid:9)(cid:13)(cid:4)(cid:24) This book is the product of the collaborative efforts of many dedicated individu- als. I would like to acknowledge the help of all involved in the collation and review process of the book, without whose support the project could not have been satisfactorily completed. Most of the authors of chapters included in this book also served as reviewers for articles written by other authors. Thanks to all those who provided constructive and comprehensive reviews. The creation of this book has been a stimulating and enlightening experience and I hope that this book will be a useful addition to the literature on digital watermarking. Dr. Juergen Seitz University of Cooperative Education Heidenheim, Germany June 2004