Watermarking and ownership problem

A revisit

Husrev T. Sencar, Nasir Memon

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Abstract

    Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.

    Original languageEnglish (US)
    Title of host publicationDRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management
    Pages93-101
    Number of pages9
    DOIs
    StatePublished - 2005
    EventDRM'05 - 5th ACM Workshop on Digital Rights Management - Alexandria, VA, United States
    Duration: Nov 7 2005Nov 7 2005

    Other

    OtherDRM'05 - 5th ACM Workshop on Digital Rights Management
    CountryUnited States
    CityAlexandria, VA
    Period11/7/0511/7/05

    Fingerprint

    Watermarking
    Digital storage

    Keywords

    • Additive watermarking
    • Counterfeit ownership
    • Ownership
    • Ownership deadlock
    • Theft of ownership
    • Watermarking

    ASJC Scopus subject areas

    • Engineering(all)

    Cite this

    Sencar, H. T., & Memon, N. (2005). Watermarking and ownership problem: A revisit. In DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management (pp. 93-101) https://doi.org/10.1145/1102546.1102563

    Watermarking and ownership problem : A revisit. / Sencar, Husrev T.; Memon, Nasir.

    DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management. 2005. p. 93-101.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Sencar, HT & Memon, N 2005, Watermarking and ownership problem: A revisit. in DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management. pp. 93-101, DRM'05 - 5th ACM Workshop on Digital Rights Management, Alexandria, VA, United States, 11/7/05. https://doi.org/10.1145/1102546.1102563
    Sencar HT, Memon N. Watermarking and ownership problem: A revisit. In DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management. 2005. p. 93-101 https://doi.org/10.1145/1102546.1102563
    Sencar, Husrev T. ; Memon, Nasir. / Watermarking and ownership problem : A revisit. DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management. 2005. pp. 93-101
    @inproceedings{8792427cd87e4d27bfc8c70afe90e93d,
    title = "Watermarking and ownership problem: A revisit",
    abstract = "Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.",
    keywords = "Additive watermarking, Counterfeit ownership, Ownership, Ownership deadlock, Theft of ownership, Watermarking",
    author = "Sencar, {Husrev T.} and Nasir Memon",
    year = "2005",
    doi = "10.1145/1102546.1102563",
    language = "English (US)",
    isbn = "1595932305",
    pages = "93--101",
    booktitle = "DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management",

    }

    TY - GEN

    T1 - Watermarking and ownership problem

    T2 - A revisit

    AU - Sencar, Husrev T.

    AU - Memon, Nasir

    PY - 2005

    Y1 - 2005

    N2 - Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.

    AB - Watermarking technologies have been envisioned as a potential means for establishing ownership on digital media objects. However, achievable robustness and false-positive rates of the state-of-the-art watermarking techniques raise doubts about applicability of watermarking to ownership problem. With this perspective, we address the security weaknesses common to most watermarking techniques and assess the role of watermarking in construction of ownership assertion systems. We identify the requirements of a watermarking based ownership assertion system. Also, we provide a basic functional outline of a practical version of such a system and identify its potential vulnerabilities. To mitigate these vulnerabilities, we aim at reducing the false positive rate of the watermark detection scheme. For this purpose, we propose embedding multiple watermarks as opposed to single watermark embedding while constraining the embedding distortion. The crux of the proposed method lies in watermark generation which deploys a family of one-way functions. We incorporate the multiple watermark embedding idea with the additive watermarking technique [1] and present results to illustrate the potential of this approach in reducing the false-positive rate of the watermark detection scheme.

    KW - Additive watermarking

    KW - Counterfeit ownership

    KW - Ownership

    KW - Ownership deadlock

    KW - Theft of ownership

    KW - Watermarking

    UR - http://www.scopus.com/inward/record.url?scp=33745838992&partnerID=8YFLogxK

    UR - http://www.scopus.com/inward/citedby.url?scp=33745838992&partnerID=8YFLogxK

    U2 - 10.1145/1102546.1102563

    DO - 10.1145/1102546.1102563

    M3 - Conference contribution

    SN - 1595932305

    SN - 9781595932303

    SP - 93

    EP - 101

    BT - DRM'05 - Proceedings of the Fifth ACM Workshop on Digital Rights Management

    ER -