DIGITAL WATERMARKING
Abstract
Digital watermarking is a security based techniques used to embed important
data within another data, ensuring that the hidden information remains
confidential and only accessible to authorized parties. This method protects
sensitive data from unauthorized access, making it an essential tool for secure
communication.
This article provides a comprehensive overview of digital watermarking,
covering its fundamental, classification, and various methods. A detailed
review of different digital watermarking techniques is presented, along with a
summary of their parameters and features in a tabular format.
Digital watermarking can be combined with cryptography and steganography
to enhance security levels. This techniques is particularly useful for research
scholars seeking to gain knowledge about digital watermarking methods and
their implementation in various tools and software, such as Matlab, XSG, and
Xilinx Vivado.
Introduction
This technique enables the identification of the content's origin, ownership,
and authenticity.
There are various types of digital watermarking, including:
- Image watermarking: Embedding a watermark into an image to protect it
from unauthorized use.
- Video watermarking: Embedding a watermark into a video to identify its
source and prevent piracy.
- Audio watermarking: Embedding a watermark into an audio file to protect it
from copyright infringement.
- Text watermarking: Embedding a watermark into a text document to identify
its authorship and prevent plagiarism.
- Graphic watermarking: Embedding a watermark into 2D or 3D graphics to
protect them from unauthorized use.
[1]
Digital watermarking can be categorized into two main types:
- Visible watermarking: A watermark that is visible to the naked eye.
- Invisible watermarking: A watermark that is not visible, but can be detected
using specialized software.
Digital watermarking has various applications, including:
- Broadcast monitoring: Identifying the source of broadcasted content.
- Copyright protection: Protecting digital content from copyright infringement.
- Authentication: Verifying the authenticity of digital content.
The digital watermarking process involves several steps, including:
- Watermark creation: Creating a unique watermark signature.
- Watermark embedding: Embedding the watermark into the digital content.
- Watermarked content distribution: Distributing the watermarked content.
Digital watermarking is vulnerable to various attacks, including:
- Robustness attacks: Attacks that attempt to destroy or remove the
watermark.
- Presentation attacks: Attacks that attempt to alter or manipulate the
watermarked content.
- Counterfeiting attacks: Attacks that attempt to create fake or pirated
content.
- Geometric attacks: Attacks that attempt to manipulate the geometric
properties of the watermarked content.
- Signal processing attacks: Attacks that attempt to manipulate the signal
properties of the watermarked content.
Cover Image Watermark
Watermark
Embedded Watermarked
Algorithm Data
Secret Key
Fig: Watermark Embedding
2 | Page
Watermark Watermarked
Recovered Detection Data
Watermark Algorithm
Secret Key
Fig: Watermark Detection
Classification of watermarking
There are several ways to classify watermarking based on different
parameters. Here's a broader explanation:
1. Based on Human Perception
● Visible Watermarks: These watermarks are clearly visible to the human
eye. They are often used in images and videos to display ownership or
copyright information. For example, a logo or text overlay on a photo.
● Invisible Watermarks: These watermarks are not visible to the human
eye and are embedded in the media using techniques like
steganography. They are used for copyright protection and can be
detected using special software.
2. Based on Robustness
● Robust Watermarks: These watermarks are designed to withstand
various types of processing and attacks, such as compression, cropping,
and noise addition. They are used for copyright protection and proof of
ownership.
● Fragile Watermarks: These watermarks are easily destroyed or altered
by any modification to the media. They are used to detect tampering
and ensure the integrity of the content.
3. Based on Application
● Public Watermarks: These watermarks can be accessed and modified by
anyone using certain algorithms. They are not secure and are used for
applications where security is not a primary concern.
● Private Watermarks: These watermarks require a secret key or
algorithm to access and modify. They are used for secure applications,
such as copyright protection and authentication.
4. Based on Embedding Domain
3 | Page
● Spatial Domain Watermarks: These watermarks are embedded directly
into the pixel values of the image or video. They are simple to
implement but may not be very robust against attacks.
● Frequency Domain Watermarks: These watermarks are embedded into
the frequency coefficients of the media using techniques like Discrete
Fourier Transform (DFT), Discrete Cosine Transform (DCT), or Discrete
Wavelet Transform (DWT). They are more robust against attacks and are
widely used in practice.
5. Based on Media Type
● Image Watermarking: Watermarks are embedded into digital images to
protect copyright and ensure authenticity.
● Audio Watermarking: Watermarks are embedded into audio files to
protect copyright and prevent unauthorized distribution.
● Video Watermarking: Watermarks are embedded into video files to
protect copyright and ensure the integrity of the content.
● Text Watermarking: Watermarks are embedded into text documents to
protect copyright and prevent unauthorized copying.
Watermarking is a versatile and essential technique in the digital age, providing
a means to protect and authenticate digital content across various media
types.
Watermarking Techniques
Digital watermarking techniques are methods used to embed hidden
information into digital media, such as images, audio, video, and text. These
techniques ensure the protection, authentication, and integrity of the content.
Here’s an expanded explanation of various watermarking techniques:
1. Spatial Domain Techniques
Spatial domain techniques involve directly modifying the pixel values of the
host image or video. These methods are relatively simple to implement but
may not be very robust against attacks.
4 | Page
● Least Significant Bit (LSB) Substitution: This technique involves
modifying the least significant bits of pixel values to embed the
watermark. It is simple and has minimal impact on the visual quality of
the image, but it is susceptible to attacks like noise and compression.
● Additive Watermarking: This method adds a pseudo-random noise
pattern to the pixel values of the host image. The noise pattern acts as
the watermark and can be detected using correlation techniques. It is
more robust than LSB substitution but may still be vulnerable to certain
attacks.
2. Frequency Domain Techniques
Frequency domain techniques involve transforming the host media into the
frequency domain and embedding the watermark into the frequency
coefficients. These methods are more robust against attacks and are widely
used in practice.
● Discrete Cosine Transform (DCT): This technique transforms the host
image into the frequency domain using the DCT. The watermark is
embedded into the DCT coefficients, which are then transformed back to
the spatial domain. This method is robust against compression and
noise.
● Discrete Fourier Transform (DFT): This technique transforms the host
image into the frequency domain using the DFT. The watermark is
embedded into the magnitude or phase of the DFT coefficients. It is
robust against geometric attacks like rotation and scaling.
● Discrete Wavelet Transform (DWT): This technique transforms the host
image into the frequency domain using the DWT. The watermark is
embedded into the wavelet coefficients, which are then transformed
back to the spatial domain. It is robust against various types of attacks
and is widely used in practical applications.
3. Hybrid Techniques
Hybrid techniques combine spatial and frequency domain methods to achieve
better robustness and imperceptibility.
● Spatial-Frequency Watermarking: This technique combines spatial
domain methods like LSB substitution with frequency domain methods
5 | Page
like DCT or DWT. It leverages the advantages of both domains to achieve
higher robustness and imperceptibility.
● Multiple Transform Techniques: This method applies multiple frequency
domain transforms (e.g., DCT followed by DWT) to the host image
before embedding the watermark. It enhances robustness against
various types of attacks.
4. Spread Spectrum Techniques
Spread spectrum techniques spread the watermark information over a wide
range of frequencies, making it more difficult to detect and remove.
● Direct Sequence Spread Spectrum (DSSS): This technique spreads the
watermark information over a wide frequency band using a pseudo-
random sequence. It is robust against noise and compression but may be
susceptible to geometric attacks.
● Frequency Hopping Spread Spectrum (FHSS): This technique changes
the frequency of the watermark signal according to a pseudo-random
sequence. It is robust against various types of attacks and can be used
for secure watermarking applications.
5. Quantization-Based Techniques
Quantization-based techniques involve modifying the quantization values of
the host media to embed the watermark.
● Quantization Index Modulation (QIM): This technique embeds the
watermark by quantizing the host media values according to a set of
predefined quantization levels. It is robust against certain types of
attacks but may introduce noticeable distortion in the host media.
● Dither Modulation (DM): This method uses a dither signal to modulate
the host media values before quantization. It enhances the robustness
and imperceptibility of the watermark but may be susceptible to certain
attacks.
6. Blind and Non-Blind Watermarking
● Blind Watermarking: In blind watermarking, the original host media is
not required to detect the watermark. The detection process relies
solely on the embedded watermark and any additional information, such
as a secret key.
6 | Page
● Non-Blind Watermarking: In non-blind watermarking, the original host
media is required to detect the watermark. The detection process
compares the original and watermarked media to extract the embedded
information.
These watermarking techniques provide a range of options for protecting and
authenticating digital content, each with its strengths and limitations. By
selecting the appropriate technique based on the specific requirements, it is
possible to achieve a balance between robustness, imperceptibility, and
security.
Watermarking Application
Watermarking has a wide range of applications across various fields. Here are
some key areas where watermarking is commonly used:
1. Copyright Protection
● Images and Videos: Watermarks are used to embed copyright
information into images and videos to prevent unauthorized copying
and distribution.
● Audio Files: Watermarks can be embedded in audio files to protect
music, podcasts, and other audio content from piracy.
● Text Documents: Watermarks are added to digital documents, such as
PDFs and Word files, to indicate ownership and prevent unauthorized
reproduction.
2. Authentication and Integrity Verification
● Document Authentication: Watermarks are used to verify the
authenticity of important documents, such as passports, certificates, and
official records.
● Product Authentication: Watermarks can be embedded in product
packaging, labels, and QR codes to ensure the authenticity of products
and prevent counterfeiting.
● Tamper Detection: Fragile watermarks can be used to detect any
unauthorized modifications or tampering with digital content.
7 | Page
3. Broadcast Monitoring
● Television and Radio: Watermarks are used in broadcast signals to
monitor the airing of commercials, programs, and other content. This
helps advertisers and broadcasters track the usage and reach of their
content.
● Online Streaming: Watermarks are embedded in streaming media to
monitor and control the distribution of digital content over the internet.
4. Digital Rights Management (DRM)
● Content Distribution: Watermarks are used to enforce digital rights
management policies, ensuring that only authorized users can access
and distribute digital content.
● Usage Tracking: Watermarks can be used to track the usage of digital
content, such as how many times a file has been accessed, copied, or
shared.
5. Medical and Scientific Data
● Medical Images: Watermarks are embedded in medical images, such as
X-rays and MRIs, to protect patient information and ensure the integrity
of the data.
● Scientific Research: Watermarks are used to protect the intellectual
property of scientific research and ensure the authenticity of research
data.
6. Forensic Applications
● Forensic Watermarking: Watermarks are used in forensic investigations
to track the source and distribution of leaked or pirated content. They
can help identify the original source of a leak and provide evidence in
legal proceedings.
7. Social Media and Content Sharing
● User-Generated Content: Watermarks are used to protect the
ownership and integrity of user-generated content, such as photos,
videos, and artwork shared on social media platforms.
● Branding: Watermarks can be used to add branding elements, such as
logos and hashtags, to digital content shared on social media.
8 | Page
8. Secure Communications
● Confidential Documents: Watermarks are embedded in confidential
documents to ensure that they are only accessible to authorized
recipients and prevent unauthorized distribution.
● Secure Messaging: Watermarks can be used in secure messaging
applications to verify the authenticity and integrity of messages.
Watermarking is a versatile and essential technology that provides a range of
solutions for protecting and authenticating digital content in various
applications.
9 | Page