Resolving rightful ownerships with invisible watermarking techniques

Limitations, attacks, and implications

Scott Craver, Nasir Memon, Boon Lock Yeo, Minerva M. Yeung

Research output: Contribution to journalArticle

Abstract

Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data. In this paper we address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.

Original languageEnglish (US)
Pages (from-to)573-586
Number of pages14
JournalIEEE Journal on Selected Areas in Communications
Volume16
Issue number4
DOIs
StatePublished - May 1998

Fingerprint

Watermarking
Standardization

Keywords

  • Attacks on digital watermarks
  • Copyright protection
  • Counterfeit watermarks
  • Cryptography
  • Invertible and non-invertible watermarking
  • Invisible watermarks
  • Quasi-invertible watermarking

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Networks and Communications

Cite this

Resolving rightful ownerships with invisible watermarking techniques : Limitations, attacks, and implications. / Craver, Scott; Memon, Nasir; Yeo, Boon Lock; Yeung, Minerva M.

In: IEEE Journal on Selected Areas in Communications, Vol. 16, No. 4, 05.1998, p. 573-586.

Research output: Contribution to journalArticle

@article{a5994bc1097d468f97d2cb7bdc94de04,
title = "Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications",
abstract = "Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data. In this paper we address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.",
keywords = "Attacks on digital watermarks, Copyright protection, Counterfeit watermarks, Cryptography, Invertible and non-invertible watermarking, Invisible watermarks, Quasi-invertible watermarking",
author = "Scott Craver and Nasir Memon and Yeo, {Boon Lock} and Yeung, {Minerva M.}",
year = "1998",
month = "5",
doi = "10.1109/49.668979",
language = "English (US)",
volume = "16",
pages = "573--586",
journal = "IEEE Journal on Selected Areas in Communications",
issn = "0733-8716",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
number = "4",

}

TY - JOUR

T1 - Resolving rightful ownerships with invisible watermarking techniques

T2 - Limitations, attacks, and implications

AU - Craver, Scott

AU - Memon, Nasir

AU - Yeo, Boon Lock

AU - Yeung, Minerva M.

PY - 1998/5

Y1 - 1998/5

N2 - Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data. In this paper we address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.

AB - Digital watermarks have been proposed in recent literature as a means for copyright protection of multimedia data. In this paper we address the capability of invisible watermarking schemes to resolve copyright ownership. We show that, in certain applications, rightful ownership cannot be resolved by current watermarking schemes alone. Specifically, we attack existing techniques by providing counterfeit watermarking schemes that can be performed on a watermarked image to allow multiple claims of rightful ownership. In the absence of standardization and specific requirements imposed on watermarking procedures, anyone can claim ownership of any watermarked image. In order to protect against the counterfeiting techniques that we develop, we examine the properties necessary for resolving ownership via invisible watermarking. We introduce and study invertibility and quasi-invertibility of invisible watermarking techniques. We propose noninvertible watermarking schemes, and subsequently give examples of techniques that we believe to be nonquasi-invertible and hence invulnerable against more sophisticated attacks proposed in the paper. The attacks and results presented in the paper, and the remedies proposed, further imply that we have to carefully reevaluate the current approaches and techniques in invisible watermarking of digital images based on application domains, and rethink the promises, applications and implications of such digital means of copyright protection.

KW - Attacks on digital watermarks

KW - Copyright protection

KW - Counterfeit watermarks

KW - Cryptography

KW - Invertible and non-invertible watermarking

KW - Invisible watermarks

KW - Quasi-invertible watermarking

UR - http://www.scopus.com/inward/record.url?scp=0032074580&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=0032074580&partnerID=8YFLogxK

U2 - 10.1109/49.668979

DO - 10.1109/49.668979

M3 - Article

VL - 16

SP - 573

EP - 586

JO - IEEE Journal on Selected Areas in Communications

JF - IEEE Journal on Selected Areas in Communications

SN - 0733-8716

IS - 4

ER -