Masking Models and Watermarking: A Discussion on Methods and Effectiveness

Masking Models and Watermarking: A Discussion on Methods and Effectiveness

Mirko Luca Lobina (University of Cagliari, Italy), Daniele D. Giusto (University of Cagliari, Italy) and Davide Mula (European University of Rome, Italy)
DOI: 10.4018/978-1-61350-135-1.ch002
OnDemand PDF Download:


Many audio watermarking techniques, presented in the last years, make use of masking and psychological models derived from signal processing. Such a basic idea is winning because it guarantees a high level of robustness and bandwidth of the watermark as well as fidelity of the watermarked signal. This work first describes the relationship between Digital Right Management, Intellectual Property, and use of watermarking techniques. Then, the crossing use of watermarking and Masking Models is detailed, providing schemes, examples, and references. Finally, the authors present two strategies that make use of a Masking Model, applied to a classic watermarking technique. The joint use of classic frameworks and Masking Models seems to be one of the trends for the future of research in watermarking. Several tests on the proposed strategies with the state of the art are also offered to give an idea of how to assess the effectiveness of a watermarking technique.
Chapter Preview


Ownership is the one’s right to possess something and decide what is to be done with it. The concept of ownership is distinct from possession, intended as having something in one's custody. Such demarcation, very easy to understand and prove in case of a material good (e.g., as a house or a car), becomes particularly ephemeral in case of digital data. First of all, the diffusion and movement of a digital content cannot be practically traced: as an example a collection of songs can be published on a Website, a CD or a DVD, and once it is legally distributed for the first time there is no way to control its following circulation. Then, there are many ways to reproduce a digital content and obtain copies identical to the original. Starting from a copy, a malicious can alter or manipulate the original content, and present himself as the owner. This can result in a great damage for the rights’ genuine owner, since an image, or a song, however in a digital format, are esteemed on the whole respect to their origin, which is a proof of quality, source and content integrity. From this introduction it seems, and it is definitely true, that the encountering problems in ownership for a digital content are the digital nature itself of the content: an image, printed on a photo-paper, can be copied more difficulty without the original matrix (e.g., the negative, in case of a photo; or the master registration in case of an audio sample) and, in every case, the copy can be easily distinguished from the original; furthermore, a photo-paper image could not be present on million of instances at the same time as happens to an image published on the Web. For all these reasons, different approaches have been developed for proving origin’s copyright information of a digital content. On the whole, Digital Rights Management (i.e., DRM) is any of these technologies, when used to control access to digital data. DRM is not a Technical Protection Measures (i.e., TPM). Actually, such technology controls or restricts the use and access of digital media content on electronic devices with such technologies installed, acting as components of a DRM design (See Figure 1). The objective of this chapter is to provide a comprehensive explanation of the crossing use of masking threshold and watermarking, as one of the most effective DRM strategies.

Figure 1.


This work is organized as follows. The first section provides an overview of DRM, discusses the distinction between cryptography and watermarking (explaining the relevant applicative fields in a DRM context of both solutions), describes watermarking in general and introduces the Masking Models. The second part is a description of the crossing use of the Masking Models and watermarking followed by two examples of use from the authors. The third part introduces what has been done in the very recent past in this field of research. Finally, some conclusions on the trade-off robustness/fidelity, and more generally on the use of Masking Models in watermark schemes, are drawn.

Complete Chapter List

Search this Book:
Table of Contents
Hideyasu Sasaki
Hideyasu Sasaki
Chapter 1
Gaurav Bhatnagar, Jonathan Wu, Balasubramanian Raman
In this chapter, a robust watermarking technique based on distributive multiresolution transforms (DMT) and singular value decomposition is... Sample PDF
Distributed Multiresolution Transform Based Framework for Watermarking
Chapter 2
Mirko Luca Lobina, Daniele D. Giusto, Davide Mula
Many audio watermarking techniques, presented in the last years, make use of masking and psychological models derived from signal processing. Such a... Sample PDF
Masking Models and Watermarking: A Discussion on Methods and Effectiveness
Chapter 3
Shiguo Lian
The principal concern of this chapter is to provide those in the secure multimedia communication or content protection community with an overview of... Sample PDF
Multimedia Content Encryption for Secure Multimedia Communication
Chapter 4
Kensuke Naoe, Yoshiyasu Takefuji
The proposed method contributes to secure image digital watermarking for content identification without damaging or losing any detailed data of... Sample PDF
Advancement on Damage-Less Watermark Extraction Using Non-Linear Feature Extraction Scheme Trained on Frequency Domain
Chapter 5
Giaime Ginesu, Mirko Luca Lobina, Daniele D. Giusto
Authentication is the way of identifying an individual. The techniques used to accomplish such practice strongly depend on the involved parties... Sample PDF
Property Protection and User Authentication in IP Networks through Challenge-Response Mechanisms: Present, Past and Future Trends
Chapter 6
Jian Li, William K. Cheung
Semantic Web technologies allow on-line resources to be semantically annotated to support more effective and intelligent online services. However... Sample PDF
Access Control on Semantic Web Data Using Query Rewriting
Chapter 7
Nariaki Nishino, Koji Fukuya, Kanji Ueda
This paper proposes a new auction mechanism with seat reservations in movie theaters using an interdisciplinary approach. In movie theater services... Sample PDF
An Auction Mechanism Considering Seat Reservations in Movie Theater Services
Chapter 8
Davide Mula, Mirko Luca Lobina
We start to analyze each component of database’s definition and to find them in a web page so that we can compare those juridical goods. After that... Sample PDF
Legal Protection of the Web Page
Chapter 9
Natalie Pang
In recent years impacts of information and communication technologies, market enclosures, and the opposing struggle to retain community and public... Sample PDF
Collaborative Production, the Knowledge Commons and the Application of Open Content Licenses
Chapter 10
Stefano Montanelli, Silvana Castano, Alfio Ferrara, Gaia Varese
In this paper, the authors present a reference P2P architecture based on autonomous, self-emerging semantic communities of interest (CoIs) for... Sample PDF
Managing Collective Intelligence in Semantic Communities of Interest
Chapter 11
Jeff J.S. Huang, Stephen J.H. Yang, Jeng C.C Chen, Irene Y.S. Li, Indy Y.T. Hsiao
The emergence of Web 2.0 has brought along the trend of community. It is also the trend that contributes to socialization of the Internet. The... Sample PDF
A Social Bookmarking-Based People Search Service: Building Communities of Practice with Collective Intelligence
About the Contributors