User:Andreas.lang/digital watermarking
From Wikipedia, the free encyclopedia
Contents |
[edit] Note, this is a preview page, which is discussed with other researchers and will be copied to the right place soon.
[edit] Instance of a Digital Watermarking Scheme
A general watermarking scheme is defined as:

where E defines the embedding function, D detecting function, R retrieval function and M the message. Furthermore, the embedding parameters
defines the parameter set used for watermark embedding,
defines the detection parameters and
retrieval parameters. Hence, each watermarking scheme Ω may have different instances according to the values that these parameters may adopt. An instance Ω * of the watermarking scheme Ω for a particular value of the parameter vectors.
[edit] Watermarking Life-Cycle Phases
In general, the usage of digital watermarking can be simplified as follows. An unmarked (mostly original) signal (S, with
) is the source signal, where the watermark (w) is embedded by using an embedding function E. The result is the marked signal SE. It can be defined, that this process is done in a secure environment. The following step could be, for example, the distribution of SE over the Internet or storage of it to provide authenticity or integrity checks. These processes can been seen as an insecure part, where attacks (
) occur on SE. After distribution of SE, the signal is defined as SEA because potential attacks could have destroyed the watermark. A detecting function D tries to detect the watermark w or a retrieval function R tries to retrieve the embedded message m'. The detection/retrieval can be done in a secure or insecure environment, depending on the used application of the watermarking algorithm.
The complete scenario is defined as life cycle of a watermark, because it begins with embedding and ends with detection/retrieval. This is shown in the following figure with expected secure and insecure parts.
The information to be embedded is called a digital watermark, although in some contexts the phrase digital watermark means the difference between the watermarked signal and the cover signal. The signal where the watermark is to be embedded is called the host signal.
A watermarking system is usually divided into three distinct steps, embedding, attack and detection. In embedding, an algorithm accepts the host and the data to be embedded and produces a watermarked signal.
The watermarked signal is then transmitted or stored, usually transmitted to another person. If this person makes a modification, this is called an attack. While the modification may not be malicious, the term attack arises from copyright protection application, where pirates attempt to remove the digital watermark through modification. There are many possible modifications, for example, lossy compression of the data, cropping an image or video, or intentionally adding noise.
Detection (often called extraction) is an algorithm which is applied to the attacked signal to attempt to extract the watermark from it. If the signal was unmodified during transmission, then the watermark is still present and it can be extracted. In robust watermarking applications, the extraction algorithm should be able to correctly produce the watermark, even if the modifications were strong. In fragile watermarking, the extraction algorithm should fail if any change is made to the signal.
[edit] Watermark Parameters
In general, the fundamental watermarking parameters are classifies into the 7 watermarking properties capacity, complexity, invertibility, transparency, robustness, security and verification (alphabetic order):
[edit] Capacity
The Capacity is in general divided into embedding and retrieval capacity.
[edit] Embedding Capacity
The embedding capacity capE of a watermarking scheme is defined as the amount of information that is (seems to be) embedded into the cover object to obtain the marked object. A simple definition for a capacity measurewould be related to the size of the embedded message, i.e.
. In addition, capacity is often given relative to the size of the cover object:
Note that such measure only takes into account the information embedded, but not the information that is retrieved. Note, also, that this measure does not consider the possibility of repeat coding, in which the mark is replicated as many times as needed prior to its insertion. All these issues are related to the retrieval capacity which is defined in the retrieval function.
[edit] Retrieval Capacity
The definition of retrieval capacity defines the capacity with respect to the retrieved message m'. First of all, zero-bit watermarking schemes do not transmit any message, since the watermark w is just detected but a message m' is not retrieved. In such a case, the retrieval capacity of these schemes is zero.
For non zero-bit watermarking schemes the retrieval capacity is considered after data extraction. The following retrieval capacity function is defined:where
,
and
depicts the exclusive or operation. This equation counts the number of correctly transmitted bits (those which are equal on both sides of the communication channel) and it is assumed that m and m' have exactly the same length (otherwise m or m' should be padded or cut in some manner).
In case of repeat coding, the retrieved message is several times longer than the embedded message:. In such a situation, the retrieval capacity should consider all the repetitions as follows
where pmax is the counted number of maximal retrieved m'. In the sequel, no repeat coding is assumed for notational simplicity, but all the formulae can be easily extended to that case. If the watermark is not embedded multiple times, then pmax = 1.
There are two relevant comments about this definition of relative capacity. The first is that usually this kind of measure is given in terms of the size of the cover object S:and it is assumed that the sizes of S, and SEA are, at least, similar. This second definition provides measures such as bits per second or in bits of transmitted information per bit of the marked object. If the latter is used, a value in the interval [0,1] is obtained, where 1 means that all the transmitted bits are used for the message, which is the best case as capacity is concerned. The second comment is that
is relative to a given pair SEA and S. An absolute measure is provided below.
Another capacity measure can be defined in terms of the ratio of correctly recovered bits normalized by pmax. If pmax is unknown, the measure ofcan also be used, but would result in highest, not normalized values.:
![]()
[edit] Complexity:
Given a function F, the complexity of it can be measured. Thereby the effort or investment needed to embed or attack or detect and retrieve the watermark is defined with complexity. A measuring function C is defined as C(F) to measure the complexity of F. If it is adapted to, for example, the embedding function of Ω, then the embedding complexity can be computed C(E,S). Depending on C, for example the computation cost of time, needed memory or IO operations, lines of code, etc. could be measured. The relative complexity of a watermarking scheme Ω * and a particular object S is defines as:However, this definition of complexity depends on the signal S. Thereby, a normalization is needed to provide results independent on S. The normalization can be done with the signal and it length (or size) or with the embedded capacity. If the length (or size) of the signal is used for normalization, then the length can be time or size needed for streaming or file size on the storage. Which exactly is defined with the function size(S). The normalization done by the embedding capacity measures the needed effort to embed one single bit. Note, that this normalization is only useable for n-bit watermarking schemes. In the following both normalizations are formalized.
Note, that in this case a linear complexity depending on the length of S is assumed. If it is non-linear, then this function cannot be used to measure the complexity. Then, the normalization depending on, for example, the embedding capacity, introduced in the following can be used.
Both definitions of complexity are related to a particular object S. Similar to other watermark properties, a definition of absolute values applies any of the following definitions: * Average complexity based on signal and capacity normalization:
![]()
* Maximum complexity for audio signal and capacity normalization:
![]()
* Minimum complexity for audio signal and capacity normalization:
![]()
![]()
[edit] Invertibility:
Refers to the property of a watermarking scheme which has the possibility to remove the watermark w from the marked signal SE completely to receive signal S' and if Ω is invertible, then S = S'. To provide this feature, the watermarking algorithms must provide special embedding techniques. Furthermore, secret keys are mostly used to protect the original content from unauthorized access. The measured value of invertibility for a watermarking scheme Ω * is a boolean value. If this value is 0, then Ω * cannot remove w from the marked object. If Ω can remove w completely and S = S', then 1 is returned.![]()
[edit] Robustness:
In this section, the robustness of a digital watermarking scheme is described. To introduce the robustness itself, the detection success is needed and introduced as first.
[edit] Detection Success
To measure the overall success of a detection or retrieval function, the detection success function is introduced. Therefore, the connection to zero-bit an n-bit watermarking scheme are introduced as follows. To measure the overall success of a detection or retrieval function, the detection success function is introduced. Therefore, the connection to zero-bit an n-bit watermarking scheme are introduced as follows. For zero-bit watermarking schemes, detDD returns 0, if the watermark could not be successful detected and 1 if the detection function was able to detect the watermark, see the following equation:To measure the successfully embedding rate over a test set
, the average of detD can be computed as follows:
For n-bit watermarking schemes, it is important to know, if the watermark was successfully detected at least once (in case of multiple embedding). If, for example, a watermark scheme embeds the message m multiple times
, and the retrieval function
returns, that 10% are positive retrievable, then it is unknown, which mi are affected. Therefore, it is useful to define a successful detection, if at least one embedded message could be retrieved positively, which is introduced in the following equation.
Note that this is not the only possible definition of the detection function in case of repeat coding. For example, another definition could be the following:
i.e. detection is reported if the ratio of correctly recovered bits is above some threshold τ (which is equal to or close to 1).
[edit] Watermark Robustness
The robustness measure robrel of a watermarking scheme is a value in the closed interval [0,1], where 0 is the worst possible value (the scheme is not robust for the signal S) and 1 is the best possible value (the method is robust for the signal S). There is a difference, for example, depending on whether the bit error rate (BER) or byte error rate (BYR) is used to measure the robustness. If the robustness is measured based on the byte error rate robbyte, then a given watermarking scheme is classified as robust if the bytes of the embedded massage (characters) are correctly retrieved. This measurement is similar to the Levenstein distance, which works and measured a distance between two given strings. It is useful in applications scenarios that need to determine how similar two strings are. Another robustness measure function based on the bit error rate robbit returns the percentage robustness of the watermarking scheme measured over the whole attacking and test set and is based on the bit changes within the retrieved message. This measurement is similar to the Hamming distance based on bit-strings. Hence, a watermarking scheme is classified as not robust, if more than ν numbers of retrieved bits are destroyed and the transparency of the attacks if higher than τ. For zero-bit watermarking schemes no retrieval function exists and no classification based on bit or byte error rates are possible. To simplify matters, the robustness measure for zero-bit watermarking schemes is always classified to robbyte.
The following example motivates the distinction between the robustness measure based on bit and byte error rate. If the message m="123", with 3 bytes and 3*8=24 bits, is embedded and after attacking, the last 6 bits are destroyed and incorrectly retrieved, then the byte error rate returns, that 2 bytes are correct (the first two) and one is false (the last), which has a value of. The bit error rate returns, that 18~bits are correct (the first) and 6 bits are false (the last), which has a value of
. If now the 1., 2., 8., 9., 16. and 17. bit are destroyed, then the byte error rate returns, that all bytes (characters) are false and the result has a value of
and this shows, that 100% of the bytes are destroyed. In contrast, the bit error rate returns, that 18 bits are correct retrieved and 6 bits are wrong, which has a value of
. Although the bit error rate does not change to the first example, differences are apparent in the byte error rater. Therefore, the following equations introduce the robustness for n-bit watermarking schemes divided into robbyte and robbit and for zero-bit watermarking schemes only for robbyte. The two robustness measures robbyte and robbit returns completely different robustness values. It is introduced to show, that different approaches are possible and depending on test goals, choices are to be made to select the measure function. It is noted, that different measure methods are available to measure the robustness, i.e. based on detR in relation to attacking transparency. The following function relates robustness based on the byte error rate to transparency for a zero-bit and n-bit watermarking scheme as follows, given SEA = Ai,j(SE):
and for a n-bit watermarking scheme:
And the robustness based on the bit error rate related to the transparency for n-bit watermarking schemes is given as:
![]()
That is, given a marked object SE and all the attacks which attack the watermark, even for optimal embedding and detection parameters (), the one which produces less distortion in the marked object SE determines how robust the scheme is. If none of the attacks in the family
erases the embedded mark, then this measure is (by definition) equal to 1 (the best possible value).
The functions measure robustness in a worst case sense. When the security of a system is to be assessed, it is usually considered that a given system is as weak as the weakest of its components. Similarly, the equation establishes that the worst possible attack (in the sense that the mark is erased but the attacked signal preserves good quality) in a given family determines how robust the watermarking scheme Ω is. If the best (maximum) transparency amongst all the attacks which destroy the mark is 0.23, then the robustness of the method as given by is 1 − 0.23 = 0.77.
However, the functions of the equation introduced above are \textit{relative} to a given object
SEA (hence the use of the subindex "rel") but usually to define
the robustness of a watermarking scheme as an inherent property not
related to any particular object, but to a family or collection of objects.
This may be referred to as the absolute robustness (
) which can be
defined in several ways. Given a family
of cover objects, and their
corresponding marked objects SE obtained by means of the embedding, the absolute
robustness based on bit and byte error rate can be defined according to different criteria, for example:
* Average robustness based on byte error rate:
* Minimum robustness (worst case approach) based on byte error rate:
* Probabilistic approach based on byte error rate:
where p stands for ``probability and r is some given threshold. For
example, if r = 0.75 and robprob = 0.9, this means that 90% of the objects
in
provide a relative robustness greater than or equal to 0.75 for the
scheme Ω.
Although a maximum robustness measure could thus be defined, it does not seem
to have any applicability, since worst or average cases are often reported as
robustness is concerned.
[edit] Security:
Described the security of the embedded watermark against specific security attacks. After defining all required security measurements(like collusion or subspace security), the relative total security
can be computed for a particular cover signal.
Whereby
defines each relative security measurement provided by
, for example, subspace security
or collusion security
and all other security measurements defined in the security set
. If the average total security
, maximum
and minimum
are measured, then the following definition are used. * Average total security:
* Maximum total security:
* Minimum total security:
![]()
[edit] Transparency:
Given a reference object Sref and a test object Stest the transparency function T provides a measure of the perceptible distortion between Sref and Stest. Without loss of generality, such a function may take values in the closed interval [0,1] where 0 provides the worst case (the signals Sref and Stest are so different that Stest cannot be recognized as a version of Sref) and 1 is the best case (an observer does not perceive any significant difference between Sref and Stest):
![T(S_\text{ref},S_\text{test}) \rightarrow [0,1]](../../../../math/8/5/e/85e5a2c6aaf82e9f9364c196e0e83cf8.png)
The relative transparency for a watermarking scheme Ω * and a
particular object S is defined as:

This definition of transparency is related to a particular object S. It is usually better to provide some absolute value of transparency which is not related to a particular object S. A definition of "absolute" transparency is related to a family / mathbbS of objects to be marked, which applies any of the following definitions: * Average transparency:* Maximum transparency:
* Minimum transparency:
![]()
[edit] Verification
Described the type of the detection/retrieval function D,R which requires information. Therefore three classifications are available: * Non-blind: If the watermarking scheme requires the cover object S, then it is associated as non-blind watermarking scheme. Often, this type of watermark scheme is referred as informed watermarking scheme. Mostly, the watermark detector/retriever is only useable from a defined group of people, which hides the watermark detector and the required original signal S. * Informed: If the watermarking scheme requires the embedded message m, the embedding parameters pE or other additional information (except the original signal S) for detection or retrieval, then the watermarking scheme is associated to this group. Often, watermarking schemes where the embedding function creates a data file needed for detection/retrieval, are associated to this type of verification. * Blind: If the watermarking scheme does not require the original signal nor additional information (e.g. m or pE), then the watermarking scheme is associated to this group. The verification (ver) is defined as list {0,0.5,1}, whereby the 1 is associated with non-blind, a 0.5 with informed and a 0 with blind. The formalization is introduced in the following equation.![]()
[edit] Classification
Digital watermarking techniques can be classified in several ways:
- Robustness
- A watermark is called fragile if it fails to be detected after the slightest modification. Fragile watermarks are commonly used for tamper detection (integrity proof).
- A watermark is called semi-fragile if it resist benign transformations but fails detection after malignant transformations. Semi-fragile watermarks are commonly used to detect malignant transformations.
- A watermark is called robust if it resists a designated class of transformations. Robust watermarks are commonly used in copyright applications (to carry ownership or forensic information) and copy protection applications (to carry copy and access control information).
- Perceptibility/Transparency
- A watermark is called imperceptible if the original cover signal and the marked signal are (close to) perceptually indistinguishable.
- A watermark is called perceptible if its presence in the marked signal is noticeable, but non-intrusive.
- Modification to an original work that are clearly noticeable are commonly not referred to as watermarks, but referred to as generalized barcodes.
- Capacity
The length of the embedded message | m | determines two different main classes of watermarking schemes:
-
- | m | = 0: The message m is conceptually zero-bit long and the system is designed in order to detect Italic only the presence or the absence of the watermark w in the marked object SE. This kind of watermarking schemes is usually referred to as Italic zero-bit or Italic presence watermarking schemes. Sometimes, this type of watermarking scheme is called 1-bit watermark, because a 1 denotes the presence and a 0the absence of a watermark.
- | m | = n > 0: The message m is a n-bit long stream (
, with n = | m | ) or M = {0,1}n and is modulated in w. This kind of schemes is usually referred to as multiple bit watermarking or non zero-bit watermarking schemes.
- Embedding method
To embed a digital watermark into a given host signal, the three working domains time- (or often called spatial), frequency- and wavelet domain have been established. Each digital watermarking scheme, working in one of the domains has its pros and cons, which can be identified by its evaluation.
-
- A watermarking method is referred to as spread-spectrum if the marked signal is obtained by an additive modification. Spread-spectrum watermarks are known to be modestly robust, but also to have a low information capacity due to host interference.
- A watermarking method is referred to be of quantization type if the marked signal is obtained by quantization. Quantization watermarks suffer from low robustness, but have a high information capacity due to rejection of host interference.
- A watermarking method is referred to as amplitude modulation if the marked signal is embedded by additive modification method which it similar to spread spectrum method but this method is especially embedded in spatial domain.
[edit] Applications
Digital Watermarking can be used for a wide range of applications such as:
- Copyright protection.
- Fingerprinting (Different recipients get differently watermarked content).
- Broadcast Monitoring (Television news often contains watermarked video from international agencies).
- Covert Communication (steganography).
[edit] Evaluation / Benchmarking
The evaluation of digital watermarking schemes can provide detailed information for watermark designer or end users. Therefore, different evaluation strategies exists. Often used from watermark designer is the evaluation of single properties to show, for example, an improvement. End users, are mostly not interested in detailed information. They want to know, if a given digital watermarking algorithm can be used for their application scenario, and if yes, which parameter sets seems to be the best.
(coming soon)
would
be related to the size of the embedded message, i.e.
.
In addition, capacity is often given relative to the size of the cover object:
Note that such measure only takes into account the information embedded, but
not the information that is retrieved. Note, also, that this measure does not
consider the possibility of repeat coding, in which the mark is
replicated as many times as needed prior to its insertion. All these issues are
related to the retrieval capacity which is defined in the
retrieval function.
where
,
and
depicts the exclusive or operation. This equation counts the number
of correctly transmitted bits (those which are equal on both sides of the
communication channel) and it is assumed that
. In such a situation,
the retrieval capacity should consider all the repetitions as
follows
where
and it is assumed that the sizes of
is relative to
a given pair
can also be used, but would result in
highest, not normalized values.:
However, this definition of complexity depends on the signal
Note, that in this case a linear complexity depending on the length of
Both definitions of complexity are related to a particular object
* Maximum complexity for audio signal and capacity normalization:
* Minimum complexity for audio signal and capacity normalization:
To measure the successfully embedding rate over a test set
For n-bit watermarking schemes, it is important to know, if the
watermark was successfully detected at least once (in case of
multiple embedding). If, for example, a watermark scheme embeds the
message
, and the retrieval function
returns, that 10% are positive retrievable, then it is
unknown, which
Note that this is not the only possible definition of the detection
function in case of repeat coding. For example, another definition could be the following:
i.e. detection is reported if the ratio of correctly recovered bits is above
some threshold
. The bit error
rate returns, that 18~bits are correct (the first) and 6 bits are
false (the last), which has a value of
. If now
the 1., 2., 8., 9., 16. and 17. bit are destroyed, then the byte error
rate returns, that all bytes (characters) are false and the result has
a value of
and this shows, that 100% of the bytes
are destroyed. In contrast, the bit error rate returns, that 18 bits are correct retrieved and 6 bits
are wrong, which has a value of
and for a n-bit watermarking scheme:
And the robustness based on the bit error rate related to the
transparency for n-bit watermarking schemes is given as:
), the one which produces less distortion in the marked
object
erases the embedded mark, then this measure
is (by definition) equal to 1 (the best possible value).
(like collusion
or subspace security), the relative total security
can be computed
for a particular cover signal.
Whereby
defines each relative security measurement provided
by
or
collusion security
and all other security measurements
defined in the security set
, maximum
and minimum
are measured, then the following definition are used.
* Average total security:
* Maximum total security:
* Minimum total security:
* Maximum transparency:
* Minimum transparency:

